For businesses planning a move to the cloud, the benefits in cost, mobility and scalability must be weighed against the threat of a data breach. If sensitive corporate data is hacked, restoring customer confidence and repairing damage to the brand can be a costly and difficult task. Chris Russell, CTO, Swivel Secure, writes.
Read MoreThe Ponemon Institute and Venafi have released new data from the 2015 Cost of Failed Trust Report, on the inherent risk and direct business impact from unsecured cryptographic keys and digital certificates on Global organizations.
Read MoreCorero Network Security has published the findings of its Trends and Analysis Report for the first half of 2015. Analyzing customer data, Corero found that attackers are continuing to leverage sub-saturating DDoS attacks with increasing frequency, using shorter attack durations to evade legacy cloud DDoS scrubbing solutions to cause network disruptions and, in some cases, distract victims while other malware infiltrates networks and steals customer information and corporate data.
Read MoreStrategic alliance combines advanced application delivery technologies with sophisticated threat management for applications and data centers; unifies customer engagement and solution deployment worldwide.
Read MoreThe risk of a serious cyber attack on civil nuclear infrastructure is growing, as facilities become ever more reliant on digital systems and make increasing use of commercial ‘off-the-shelf’ software, according to a major new report from Chatham House.
Read MoreSkyhigh Pervasive Cloud Control enables Mobile-to-Cloud visibility and policy enforcement.
Read More