Employees responsible for 35% of ICO data security incidents since 2015

New analysis has found that over the last three years, 35% of all major data breaches were caused by negligent or malicious employees, costing the UK-based organisations involved almost ?500,000 in fines from the Information Commissioner’s Office (ICO).

Read More
Individual DDoS attacks can cost enterprises US$ 50,000

DDoS attacks can cost enterprises $50,000 per attack – but lost revenue is still only considered to be the fourth most damaging consequence of this type of cyber-attack, according to research published by Corero Network Security.

Read More
NEWS
Cybercriminals continue to rely on human interaction

Proofpoint has published its annual Human Factor report findings, which details how cyberattackers are actively working to exploit people instead of software flaws to steal money and information for financial gain, espionage, and to establish footholds for future attacks.

Read More
WinMagic delivers unified encryption and key management

WinMagic has launched its latest software release, SecureDoc 8.2.  Purpose-built for a...

Read More
Citrix Analytics Service addresses security threats

New Citrix Analytics Service will provide visibility into company-wide user and entity behaviour,...

Read More
AlienVault unveils Free threat-scanning service for endpoint devices

AlienVault has launched its OTX Endpoint Threat Hunter™, a free threat-scanning service in...

Read More
Helping enterprises transform their security capabilities

Trustwave has unveiled a new cybersecurity consulting practice designed to help enterprises...

Read More
ABA brings together machine learning and human expertise

Rapid7 has introduced a new capability, Attacker Behaviour Analytics (ABA), in its InsightIDR...

Read More
Consistent security and governance

Hortonworks Data Steward Studio allows enterprises to find, identify, secure and connect data...

Read More
Millions of applications risk exposing personal data due to 3rd party code

While analysing popular dating apps, Kaspersky Lab researchers have found that some transmit...

Read More
Fortinet delivers integrated NOC-SOC solution

New management and analytics solution integrates Network Operations Center (NOC) and Security...

Read More
Unisys appoints Mathew Newfield as Chief Information Security Officer

Former IBM security leader brings wealth of experience working in both internal and client-facing...

Read More
NEWS
Alliance for intelligence-driven security

Recorded Future, the leading threat intelligence provider, has introduced Recorded Future Connect...

Read More
NEWS
Privileged access concerns

Bomgar’s annual Privileged Access Threat Report highlights that privileged insider and...

Read More

Videos

Avi Baum, CTO at Hailo, discusses why AI infrastructure needs are already shifting from centralized to edge, how telcos can evolve and future-proof their business to keep up with that transition, and what’s...
Michael Akinla, Business Manager UK / Ireland / Nordics at Panduit, explains that, as increasing numbers of data centres are being developed with GPU-based compute as a key growth opportunity, factoring in...
Joe Capes, CEO of LiquidStack, outlines the thinking behind the launch of the company’s GigaModular™ CDU - the industry’s first modular, scalable Coolant Distribution Unit with up to 10MW cooling...
Gina Archbold, Channel Business Manager at BlueSnap, provides an update on the company’s Partner Program - explaining how the BlueSnap global payment orchestration platform provides an integrated, single...

Expert Opinions

By David Higgins, Senior Director, Field Technology Office, CyberArk.
The Middle East is undergoing a huge shift in its engineering and infrastructure sectors, with chapmanbdsp perfectly poised at the centre of the region’s transformation.
In the rush to embrace cloud-first strategies, data security has become dangerously misunderstood, and the result is a fragmented, chaotic environment that’s starting to feel like the Wild West.