Eskenzi PR ad banner Eskenzi PR ad banner

Editor's News

A new global data security study from Blancco Technology Group and Kroll Ontrack found varying amounts and types of residual data on used mobile devices, hard disk drives and solid state drives purchased online from Amazon, eBay and Gazelle.com. Based on an examination of 122 pieces of second-hand equipment, 48 percent of the hard disk drives and solid state drives contained residual data, while thousands of leftover emails, call logs, texts/SMS/IMs, photos and videos were...

Read more
attack

Varonis Systems, Inc. (Nasdaq:VRNS), the leading provider of software solutions for unstructured, human-generated enterprise data, today announced the interoperability of its DatAdvantage and DatAlert solutions with the FireEye® Threat Analytics Platform™ (TAP™). The interoperable solutions from this new technology alliance will be showcased at the FireEye Cyber Defense Summit, taking place October 12-14 at the Washington Hilton in Washington, DC, and via a live webinar at 2:00 PM ET on October 28. (For more details see...

Read more

Cyber criminals are attempting to break into a growing number of applications being deployed in the cloud, says the latest Cloud Security Report from SaaS provider, Alert Logic. Between January 1st and December 31st 2014, Alert Logic analysed one billion events in the IT environments of over 3,000 of its customer. The resulted in identifying more than 800,000 security incidents. These insights were gleaned from customer environments on premises, in the cloud and hosted, and...

Read more

Palo Alto Networks®, the next-generation security company, today announced the latest edition of its Application Usage and Threat Report (AUTR) completed by the Palo Alto Networks Unit 42 Threat Intelligence team. The report, based on data from more than 7,000 enterprises worldwide, showcases real-world trends in enterprise application usage and critical developments in how attackers are attempting to infect organisations. It also offers practical recommendations for preventing cyberattacks. Findings highlight the explosion in adoption of...

Read more

Only 18% of European businesses surveyed have fully implemented a digital testing strategy, according to a new study by market research and strategy company, Pierre Audoin Consultants (PAC). "Digital Testing in Europe – Strategies, Challenges & Measuring Success," looks at how organisations are ensuring that the testing and Quality Assurance (QA) function is able to support the digital agenda of the business. This is often led by departments such as sales and marketing, who circumvent...

Read more

Corero Network Security (LSE: CNS), a leading provider of First Line of Defense® security solutions against DDoS attacks, today announced the findings of its Trends and Analysis Report for the first half of 2015. Analyzing customer data, Corero found that attackers are continuing to leverage sub-saturating DDoS attacks with increasing frequency, using shorter attack durations to evade legacy cloud DDoS scrubbing solutions to cause network disruptions and, in some cases, distract victims while other malware...

Read more

Bromium®, Inc., the pioneer of threat isolation to prevent data breaches, today announced the results of “CTIA Super Mobility – Understanding Mobility and Risk,” a survey of mobile users who attended the CTIA Super Mobility 2015 conference, focused on public network access patterns. The research reveals that the majority of mobile users access corporate assets through public networks, despite being aware of their security risk. “There are multiple risks associated with connecting to public networks,...

Read more
fraud

Kount, a leading supplier of fraud protection and sales boosting technology, today revealed three current tends converging to create the perfect storm of fraud, along with tips that both vendors and consumers can use to protect themselves. Kount’s “Perfect Storm of Fraud” eBook takes a look at how new, emerging technologies that claim to make transactions safer and protect consumer information can actually have the adverse effect, putting businesses and consumers alike at even greater...

Read more

FireEye, the leader in stopping today’s advanced cyber attacks, introduces an overview of the threat landscape in the UK for the first half of 2015 in its Regional Advanced Threat Report (ATR) for EMEA. FireEye has examined the activity, attempts and targets of different Advanced Persistent Threats (APT) in the first six months of this year. The report is based on data from the FireEye Dynamic Threat Intelligence™ (DTI™) cloud and highlights the growing footprint...

Read more

UK companies are placing themselves at risk of cyberattacks and data breaches as a result of rampant use of cloud storage services and unclear or non-existent corporate policies according to research released today by WinMagic Inc. The survey, conducted by CensusWide, of 1,000 office workers in organisations of 50 or more employees revealed widespread, and often unilateral employee use of cloud storage services could be leaving businesses with poor visibility of where their data is...

Read more
Page 180 of 295 1 179 180 181 295