FireEye report reveals possible malware “Cyber Arms Dealer”

FireEye, Inc. has announced the release of a new report, Supply Chain Analysis: From Quartermaster to Sunshop. The report details how many seemingly unrelated cyber attacks may, in fact, be part of a broader offensive fueled by a shared development and logistics infrastructure — a finding that suggests some targets are facing a more organized menace than they realize.

Read More

Acronis delivers enterprise-grade control and security for mobile file access and sharing in the Enterprise

Acronis® has released activEcho® 3.0 and mobilEcho® 5.0, providing enterprise-level management combined with consumer-grade simplicity for secure file access, synchronisation and sharing on mobile devices. These two products now include the Acronis Policy Engine, which provides granular management capabilities to create security policies and ensures control and compliance on all devices.

Read More

Trustwave acquisition bolsters data protection

Trustwave has announced the acquisition of data security provider Application Security, Inc. The company’s automated database security scanning technologies strengthen Trustwave’s ability to help organisations protect high-value data, reduce security risks and achieve compliance with mandates and regulations.

Read More

Stonesoft NGFW 5.6 update introduces API and enhanced virtualisation support

The cyber security expert Stonesoft, A McAfee Group Company, releases version 5.6 of its visionary Next Generation Firewall (NGFW). The release enables straightforward integration between the Stonesoft Security Management Center and 3rd party management systems as well as expands the virtual engine support to all available network security roles of Stonesoft NGFW.

Read More


DXi6900 advances high-performance, scalable portfolio for modern data protection workflows.
Vormetric has announced the results of its 2015 Insider Threat Report (ITR), conducted online on...
Nearly seven out of ten attacks on all firms involved viruses, spyware or malware.
Research from Avast has found that employees in almost a third (31%) of Small and Medium...
While 82 percent of respondents believe the IT security industry is making progress against cyber...
Passwordless authentication, progressive profiling, per-app branding and unlimited use cases now...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more