NEWS

Fifty percent increase in Botnet stolen credentials

Blueliv, a leading enterprise-class cyberthreat intelligence company, has launched its 2018-2019 Annual Cyberthreat Landscape Report providing insights into emerging and evolving cybersecurity trends. The report reveals that botnet stolen credentials increased by a staggering fifty percent in 2017-2018, with technology and telco sectors being the target for over half of those stolen.

Read More

NEWS

Companies stuck in continuously reactive cybersecurity response cycle

IT decision makers are facing major challenges between dynamic adversaries, significant legislation and regulation requirements, business digital transformation needs, and a rapidly-growing array of technology solutions. Ideally, business requirements would be the key motivator for an organisation’s approach to cybersecurity strategy. But, nearly two out of three U.K.-based IT and security decision makers say their security programme is continuously reactive due to constantly changing...

Read More

NEWS

Unified access management can drive dynamic marketplaces

OneLogin has released a study that found the workforce, workplace, and the technologies that support them will be so different by 2025 that enterprises need to provide global access and ensure continuous uptime now. Enterprises must start addressing global digital transformation strategies, including Unified Access Management, to remain agile and relevant.

Read More

NEWS

Cybercriminals earning over $3B annually exploiting social platforms

Ready availability of hacking tools, wildfire spread of malware and proliferation of cryptomining has seen social media-enabled cybercrimes grow by more than 300-fold.

Read More



Arxan expands international presence in response to growing demand for protecting applications in...
With 2014 now in full swing, Catalin Cosoi, Chief Security Strategist at Bitdefender, draws on his...
Tenable has released the Measuring and Managing the Cyber Risks to Business Operations Report, an...
IDC study finds that companies are choosing to go it alone with Threat Intelligence despite growing...
Leveraging User Behavior Analytics (UBA) to make dynamic risk assessments in real-time is the most...
By Steve Weiner, Offering Manager - Data Centres at Fujitsu UK and Ireland.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more