Guru's Picks

Securonix Selected As SC Media Europe 2019 ‘Best SIEM Solution’ Award Finalist.

Securonix, the market leader in next-generation security information and event management (SIEM), has been recognised as a Award finalist in the ‘Best SIEM Solution’ category for the 2019 SC Awards Europe. Securonix Next-Generation SIEM is reinventing the SIEM market by transforming big data into actionable security intelligence, leveraging machine learning to power advanced threat detection, rapid investigation, and intelligent incident response. “It’s an honour to be selected as a top SIEM solution by SC Magazine,”...

Read more
International Women’s Day: Tales From The Cybersecurity Frontline.

A gender balanced working world is both a women’s and business issue. This International Women’s Day the #BalanceforBetter campaign should strike a chord with security professionals worldwide. It is currently estimated that women make up only a fifth of global IT security professionals, despite the well documented and growing cyber skills shortage, which is expected to reach 3.5 million by 2021. The women working in cybersecurity today are facing gender-based challenges. However, all these women...

Read more
Taking Action To Bring Balance On International Women’s Day.

By Ilijana Vavan, Managing Director at Kaspersky Lab International Women’s Day centres around the theme of #BalanceforBetter. I am thoroughly behind this message as I think it’s particularly adept in my industry – cybersecurity. The question of gender imbalance in the industry has never been more important we see increasing calls from all over for more women to be part of our incredible industry, one that currently lacks a high proportion of female talent. Estimates...

Read more
Data Protection Day – New Year, Same Passwords?

By Sandor Palfy, Chief Technology Officer of Identity and Access Management at LogMeIn The number of data breaches we saw in 2018 – let alone those we saw in the last couple of weeks – certainly brings a somber mood to this year’s Data Protection Day. Big names, including the likes of British Airways, Cathay Pacific and Facebook made headlines last year for all the wrong reasons, and the fact that it took less than...

Read more
Markus Braendle.

Extortion Attacks On OT And IIoT Infrastructure Prediction: Critical Infrastructure Will Be Disrupted By A Major Extortion Attack We’ve already seen extortion-driven attacks on infrastructure such as cities and ports, which history suggests will continue and spread to energy and transport infrastructure. With the introduction of Industrial Internet of Things (IIoT), manufacturing industry will become a new target. Professional cybercrime is increasingly driven by the simple psychology of extortion, while the almost limitless potential targets...

Read more
Tripwire Releases State of Cyber Hygiene Report, Identifies Where Organizations Fall Behind on Basics.

More than 60 percent of organizations not leveraging established hardening benchmarks. Tripwire, Inc., a leading global provider of security and compliance solutions for enterprises and industrial organizations, today released its State of Cyber Hygiene report. The survey, conducted in July in partnership with Dimensional Research, included responses from 306 IT security professionals. Tripwire examined how organizations are implementing security controls that the Center for Internet Security (CIS) refers to as "Cyber Hygiene." The survey found...

Read more
Lastline Announces AI-driven Network Traffic Analysis Solution That Stops Advanced Threats From Entering or Operating Within a Network.

Understaffed security teams now can quickly and accurately identify high-risk attacks, focusing remediation efforts where they’ll have the greatest benefit Lastline®, the leader in advanced threat protection, today announced Lastline Network Defender™, an AI-driven network security product that prevents costly business disruption by stopping advanced threats from entering or operating within a network. Companies can more effectively protect sensitive data and valuable IP from cyberattack with their limited security staff. Security teams are facing relentless...

Read more
Page 2 of 2 1 2