News

IoT And DDoS Attacks: A Match Made In Heaven.

Written by Adrian Taylor, Regional VP of Sales for A10 Networks By 2020, Gartner predicts the total number of IoT devices will reach 20.4 billion. At the same time, DDoS attacks are on the rise, with Cisco estimating that the number of DDoS attacks exceeding 1 gigabit of traffic per second will soar to 3.1 million by 2021. While correlation does not equal causation, in this case I believe that the two are connected. There...

Read more
New Kaspersky Endpoint Security For Business Provides Security Teams With Greater Control And Automatic Anomaly Detection.

Kaspersky Lab has unveiled the next generation of its endpoint protection with new Kaspersky Endpoint Security for Business. The product features Adaptive Anomaly Control, which intelligently perceives and blocks anomalous applications and user behavior, and offers improved protection from miners and network threats. Kaspersky Endpoint Security for Business now also provides users with a web-based management console, along with features to help automate administrator tasks — all to give IT security teams greater control across...

Read more
Collaborative Work Management Platform Wrike Bolsters Security Offering.

Collaborative work management (CWM) platform Wrike has announced seven new security features, including encryption key management, customized access management and cloud access security broker (CASB) integration support. The company has also earned the ISO/IEC 27001:2013 certification from the British Standards Institution, which ensures that Wrike has an end-to-end security framework and a risk-based approach to managing information security. The Wrike security strategy includes a comprehensive approach across five categories: physical, network, system, application, and people....

Read more
Things To Know Before Developing Intelligence Requirements.

Written by Mike Mimoso, Editorial Director, Flashpoint To state the obvious, proper intelligence requirements must be in place before data collection, analysis, and consumption of intel can happen. These requirements are critical because they enable an organisation to choose and prioritise its intelligence goals, determine what information it needs to collect and from what sources to achieve those goals, establish how it will process this information, and identify which dissemination methods are most appropriate for...

Read more
Taking Action To Bring Balance On International Women’s Day.

By Ilijana Vavan, Managing Director at Kaspersky Lab International Women’s Day centres around the theme of #BalanceforBetter. I am thoroughly behind this message as I think it’s particularly adept in my industry – cybersecurity. The question of gender imbalance in the industry has never been more important we see increasing calls from all over for more women to be part of our incredible industry, one that currently lacks a high proportion of female talent. Estimates...

Read more
Tripwire Survey: 80 Percent Of Security Professionals Say Skilled Workers Are More Difficult To Find.

Tripwire, Inc., a leading global provider of security and compliance solutions for enterprises and industrial organisations, today announced results of a survey conducted by Dimensional Research that examines how organisations are addressing the cybersecurity skills gap. The survey was administered to 336 IT security professionals in February. Eighty percent of survey respondents believe it's becoming more difficult to find skilled cybersecurity professionals. As emerging technology and threat landscapes experience rapid transformation, the skillsets needed change...

Read more
Gigamon ATR Examines How Prolific Cyberthreats Traverse Networks And What You Can Do About It.

Gigamon Inc. (“Gigamon”), the essential element of security infrastructure, providing pervasive visibility to network traffic across physical, virtual, and cloud environments, announced the release of the latest research report from Gigamon Applied Threat Research (ATR), How the Most Prolific Malware Traversed Your Network Without Your Knowledge. Based on observed attack data over the second half of 2018 (2H 2018), the report reveals the command-and-control and lateral activities of three highest-volume malware, Emotet, LokiBot, and TrickBot....

Read more
Gospel Technology Scoops Prestigious Red Herring Top 100 Europe Award.

Gospel Technology, the leading provider of enterprise blockchain solutions that enable inter-enterprise trusted data collaboration and governance, has been awarded the Red Herring Top 100 Europe award, which recognises Europe’s leading private companies and celebrates the impact of innovations and technologies across various industries. Red Herring Top 100 Europe enlists outstanding entrepreneurs and promising companies. It selects the award winners from approximately 1,200 privately financed companies each year in the European Region. Since 1996, Red...

Read more
Cybereason Outperforms Its Competitors In The MITRE ATT&CK Evaluations.

The Company’s Cyber Defense Platform’s Automated Threat Detection Delivers the Most Coverage Across the Entire MITRE ATT&CK Framework, the Most Real-Time Alerts and the Most Correlation Cybereason, creators of the leading Cyber Defense Platform, today announced it has outperformed every competitor as a result of the MITRE ATT&CK Evaluations, released earlier today. The company’s Cyber Defense Platform demonstrates best-in-class automated threat detection, including total coverage across all MITRE ATT&CK phases, the most real-time alerts, and...

Read more
Polaris Software Integrity Platform Enables Security and Development Teams To Build Secure, High-Quality Software Faster.

With the most recent estimate of the average cost of a breach at $3.86 (a 6.4% increase since the previous year), and with 84% of breaches occurring in the application layer, application security is a growing concern among organisations of every sector. The need for an integrated, efficient tool for developers to monitor the security standpoint of their software is as actual as it has ever been. In response to this need, cybersecurity leader Synopsys,...

Read more
Page 1 of 1033 1 2 1,033