Breaches linked to ageing federal infrastructure

BeyondTrust has unveiled the results of its Federal Cyber-Security Threat Survey Report 2017.  Based on a comprehensive survey of senior Federal IT professionals, the study exposes an aging Federal computing infrastructure which has led to an environment with an alarmingly high risk of breaches.

Read More

LogRhythm launches Technology Alliance Partner (TAP) programme

Facilitating deeper engagements with key technology integration partners and deliver greater protection across the full threat lifecycle.

Read More

BeyondTrust contributes vulnerability statistics to Verizon report

Verizon’s report finds 81% of breaches leveraged legitimate user passwords and other credentials to breach systems.

Read More


NEC, Infosec and SEC Consult enhance cybersecurity

NEC Corporation (NEC; TSE: 6701), Infosec Corporation (Infosec), a specialized security company belonging to the NEC Group, and SEC Consult Unternehmensberatung GmbH (SEC Consult), a security consultancy based in Vienna, Austria, have commenced a collaboration in the field of cybersecurity.

Read More

Gigamon delivers intelligent visibility for securing 40Gb and 100Gb networks

New flagship appliance GigaVUE-HC3 delivers pervasive visibility for the highest performance networks to improve infrastructure security efficiency and effectiveness.

Read More

Fidelis Elevate is the first platform of its kind to enable organisations to calculate their...
Campbell Global, a leader in sustainable timberland and natural resource investment management, is...
By Wieland Alge, VP & GM of EMEA at Barracuda Networks.
ThreatQuotient has introduced new ThreatQ platform advancements, a robust Partner Integration...
Integrating real-time antimalware and on-demand antivirus with its best-of-breed personal backup...
NordVPN issues seven cybersecurity resolutions for executives and employees to increase security in...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more