Featured

International Women’s Day: Tales From The Cybersecurity Frontline.

A gender balanced working world is both a women’s and business issue. This International Women’s Day the #BalanceforBetter campaign should strike a chord with security professionals worldwide. It is currently estimated that women make up only a fifth of global IT security professionals, despite the well documented and growing cyber skills shortage, which is expected to reach 3.5 million by 2021. The women working in cybersecurity today are facing gender-based challenges. However, all these women...

Read more
Northrop Grumman Sponsors 2019 CyberCenturion Competition In London.

Northrop Grumman Corporation (NYSE: NOC) welcomes some of the UK’s brightest 12-18 year olds to compete in the fifth National Finals of CyberCenturion, a nationwide cyber defence competition led by Northrop Grumman, in partnership with Cyber Security Challenge UK, and with support from the U.S. Air Force Association. More than 470 teams from across the UK and Overseas Territories took part in a series of intense qualifying rounds over the last six months. The fifteen...

Read more
Masergy Advocates For A Stronger Focus On Cybersecurity At The British Legal Technology Forum 2019.

Masergy, a leading provider of secure SD-WAN, cloud communications and managed security solutions, today announced that Craig D’Abreo, Masergy’s VP of Security Operations will present at the British Legal Technology Forum on 12th March 2019 at 10 AM BST. Taking place at Old Billingsgate in Central London, The British Legal Technology Forum 2019 is Europe’s largest legal technology conference and exhibition, attracting around 1,200 visitors from the world of law, legal technology and IT security....

Read more
CyberArk Launches Industry’s First Privileged Access Security Solution For Continuous Discovery And Protection In The Cloud.

CyberArk (NASDAQ: CYBR), the global leader in privileged access security, today announced ground-breaking new capabilities to simplify the continuous discovery and protection of privileged accounts in cloud environments. The CyberArk Privileged Access Security Solution v10.8 is the first-of-its-kind to automate detection, alerting and response for unmanaged and potentially-risky Amazon Web Services (AWS) accounts. This version also features new industry-leading Just-in-Time capabilities that deliver flexible user access to cloud-based or on-premises Windows systems. According to Gartner,...

Read more
CrowdStrike Announces Industry’s First Endpoint Detection And Response Solution For Mobile Devices.

CrowdStrike® Inc., the leader in cloud-delivered endpoint protection, today announced CrowdStrike Falcon® for Mobile, the first enterprise endpoint detection and response (EDR) solution for mobile devices. Based on CrowdStrike’s proven EDR technology for enterprise endpoints, Falcon for Mobile enables security teams to hunt for advanced threats on mobile devices and provides unprecedented visibility into malicious, unwanted, or accidental access to sensitive corporate data, while protecting user privacy and without impacting device performance. Leveraging CrowdStrike’s cloud-native...

Read more
Adaptiva Introduces The Future Of Vulnerability Management With Evolve VM At RSA Conference 2019.

Adaptiva, a leading, global provider of endpoint management and security solutions for enterprise customers, today launched a new endpoint compliance and vulnerability management product, Evolve VM™. Evolve VM harnesses Adaptiva's industry-leading peer-to-peer technology to automatically detect and remediate thousands of vulnerabilities on a massive scale and at the fastest speeds possible. The company will unveil Evolve VM at RSA Conference ! 2019, being held March 4-8 at Moscone Center in San Francisco. Evolve VM leverages...

Read more
Deep Secure Launches Content Threat Removal-As-A-Service To Defeat 100% Of Content Threats.

Deep Secure, the creator of Content Threat Removal technology, today announces the launch of Content Threat Removal-as-a-Service (CTRaaS), a new cloud-based service that will stop organisations from falling victim to cyberattacks concealed in digital content. Cybercriminals are increasingly using content as a vehicle for spreading malware, ransomware and undetectable threats. Rather than detecting and protecting against these threats, Content Threat Removal creates an exact visual replica of any content that is shared with the organisation,...

Read more
SentinelOne Collaborates With Intel To Increase Detection Rates Of Cryptominer And Advanced Memory-Based Attacks.

SentinelOne, the autonomous endpoint protection company, and Intel today announced the integration of hardware-based Intel® Threat Detection Technology (Intel TDT) Accelerated Memory Scanning capabilities with the SentinelOne autonomous endpoint protection console. Independent benchmark testing from Passmark Software validates that SentinelOne’s approach, using Intel’s silicon to power threat scanning, significantly increases detection rates of memory-based attacks such as crypto miners, while providing a 10x improvement in scanning time with no increase in CPU usage. Intel and...

Read more
2019 Webroot Threat Report:  Forty Percent Of Malicious URLs Found On Good Domains.

Webroot, the Smarter Cybersecurity® company, revealed the results of the 2019 Webroot Threat Report, showcasing that while tried-and-true attack methods are still going strong, new threats emerge daily, and new vectors are being tested by cybercriminals. The report is derived from metrics captured and analysed by Webroot’s advanced, cloud-based machine learning architecture: the Webroot® Platform. Notable Findings: 40 percent of malicious URLs were found on good domains. Legitimate websites are frequently compromised to host malicious...

Read more
SMEs Will Benefit From The Rollout Of Active Cyber Defence – Is This The Birth Of An ‘NHS For Cybersecurity?’, Asks Memset.

Managed services provider Memset welcomes the clear benefits to the security of SMEs in the UK, presented by the recommended rollout out of the NCSC’s Active Cyber Defence (ACD) programme. Endeavours such as this can help us succeed in driving out low-sophistication ‘commodity’ cyber-attacks from the UK. The Cybersecurity Research Group and Policy Institute at King’s College London recently published a report recommending rolling out ACD into the private sector – which was originally launched...

Read more
Page 9 of 15 1 8 9 10 15