Exclusive: VMware’s challenges and opportunities in cybersecurity
While it’s still critically important to have a strong perimeter, it is widely accepted now that the status quo of security simply doesn’t work anymore.
Trend Micro launches VPN offering
Whitepaper: Optimising syslog-ng in conjunction with Docker
Cyber attacks on healthcare companies growing
Sophos acquires Rook Security to provide managed detection and response
Whitepaper: Unlocking SIEM to reduce cost and improve performance
Forrester names Proofpoint leader in enterprise email security
Kaspersky rebrands, unveils new logo
The two-decade-old company says it has moved beyond the antivirus laboratory to having an advanced and comprehensive portfolio
A10 Networks adds zero-day automated protection (ZAP) to DDoS Defence
Today’s DDoS attacks are more prevalent, multi-vector in nature and morph over time.
Scams rampant on dating websites and apps
Romance scams are popular because they prey on vulnerable people looking for love, and the victims want to believe what they are reading and seeing, which causes them to forget basic protection from scams."
Whitepaper: Are you getting your money’s worth from your SIEM?
Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems.
Whitepaper: Five stages of vulnerability assessment strategies
Tenable’s Cyber Defender Strategies Report specifically focuses on key performance indicators (KPIs) associated with the Discover and Assess stages of the five-phase Cyber Exposure Lifecycle.
Canalys’ top picks for Cybersecurity Leadership Matrix 2019
The matrix is based on unique feedback from channel partners via the Candefero channels community, combined with Canalys quarterly shipment estimates and analyst insight.
Why Splunk and syslog-ng are a log management dream team
This guideline describes scenarios in which Splunk users can benefit from syslog-ng Premium Edition features and offers some technical guidance to optimise the syslog-ng configuration.
Building a hybrid cloud strategy with VMware Cloud on AWS
A roundtable discussion brought CIOs together to discuss achieving cost and performance efficiencies for organisations moving towards hybrid cloud.
Untagged data a major risk to businesses - Veritas
Over half of company data remains unclassified, despite a rise in security breaches and stringent data protection regulations.
Retailers failing customers when it comes to data security
Retailers are failing to adequately secure customer’s data, especially when it comes to application development processes (DevOps), new research from Claranet indicates.
Cloud-based ID card issuance will reinvent government processes
HID Global meets the most demanding requirements for security, quality, and effective program execution in today’s most complex ID programs.
Whitepaper: A definitive state of play on business readiness for cloud migration
Addressing ageing infrastructure and delivering cost savings across current IT environments are two leading objectives for cloud migration.
Ping Identity releases capabilities framework for zero trust deployments
The Ping Identity model provides numerous starting points for architecting Zero Trust security.
Whitepaper: Three keys to understanding the SaaS security landscape
Organisations worldwide can ensure more effective implementations by including three essential elements in their overall SaaS security strategies.
Practical steps to selling cloud security-as-a-service
One of the largest inhibitors to cloud adoption is concern around the security of leveraging a service provider in a multi-cloud world.
Insight Partners snatches up Recorded Future for $780m
“This transaction is the logical next step for Recorded Future given the opportunities in front of us, as we fully realize the potential and vision of our strategy."
Researchers create AI-enabled computer keyboard malware
Researchers at Israel’s Ben-Gurion University of the Negev have created a proof-of-concept attack that can mimic the way people write via their computer keyboards.
Whitepaper: Data management strategies for a new information management environment
Companies are finding that their older, legacy archive strategies are increasingly ineffective in the new regulatory environment.
HID Global releases fingerprint reader in AU market
HID Global has introduced a new fingerprint reader to the Australian market, as biometric authentication becomes the fastest-growing segment in the access control market.
Emotet drove 61% of malicious payloads in Q1 2019 - Proofpoint
“The massive shift in Emotet’s prevalence and classification highlights just how quickly cybercriminals are adapting new tools and techniques across attack types.”
Whitepaper: Email cyber resilience starts with a team's buy-in
How to help organisations understand their cyber resilience responsibilities.
Need a better way to parse, store, and analyse logs?
Find out how to parse data with syslog-ng, store it in Elasticsearch, and analyze it with Kibana.
Opportunity growing in cyber-physical system market
The market for systems that monitor and control mechanical devices will more than double in the next 10 years with security a priority.
Credentials install base set to hit 11 billion by 2023
The number of smart card shipments is forecast to increase from 618.8 million in 2018 to 732.7 million in 2023, according to ABI Research.
Whitepaper: How administrators can secure Office 365 with Mimecast
What IT teams want is the same sense of security they had when they were managing email servers on-premises.