Please turn on your JavaScript for this page to function normally.
Siemplify
Webinar: Running a SOC with security orchestration

Whether an Enterprise SOC or an MSSP the challenges of too many alerts, disconnected tools and a shortage of analysts continue to plague security operations. Security …

cloud storage
5 cloud storage predictions for 2018

At this point, the cloud is old news. This does not, however, diminish its continuing impact on individuals and businesses worldwide. As cloud-based services strive towards …

AI
Most businesses to invest in artificial intelligence by 2020

Eighty-five per cent of senior executives plan to invest in artificial intelligence (AI) and the Internet of Things (IoT) by 2020, according to a new survey of UK digital …

shopping
Identity theft concerns won’t hold back holiday shopping

Despite concerns about identity theft and fraud, consumers don’t plan to curb their holiday shopping, according to Discover. While 62 percent of consumers are very or …

Waterfall Unidirectional Security Gateway
Sophisticated industrial network monitoring without connectivity risks

SecurityMatters and Waterfall Security Solutions announced a global partnership to protect industrial control systems from the most advanced cyber threats. The joint solution …

DDoS
Criminals leverage unsecured IoT devices, DDoS attacks surge

Organizations experienced an average of 237 DDoS attack attempts per month during Q3 2017 – equivalent to 8 DDoS attack attempts every day – as hackers strive to take their …

Hand
Why hackers reuse malware

Software developers love to reuse code wherever possible, and hackers are no exception. While we often think of different malware strains as separate entities, the reality is …

Pyeongchang 2018
South Korea Winter Olympics: Cyber lessons from the past

There is little doubt that guns, gates, and guards will be on full alert in Pyeongchang, South Korea as the nation readies itself for the 2018 Winter Olympics, which begin …

cloud
Sad state of enterprise cloud infrastructure governance

A new survey of more than 300 IT professionals, conducted by Propeller Insights in October 2017, revealed that the state of enterprise cloud infrastructure governance is …

risk
Week in review: Risk assessment, fileless attacks, and the most hackable holiday gifts

Here’s an overview of some of last week’s most interesting news and articles: Review: EU GDPR Documentation Toolkit The General Data Protection Regulation (GDPR) …

fingerprint
Poor security habits are the ideal recipe for a breach

A Preempt survey of more than 200 employees (management level or above) from enterprise companies of 1000 or more people, found that businesses are left exposed by employees …

Android smartphone
Safeguard mobile devices: VPNs and personal firewalls are vital

As mobile devices have permeated every aspect of private and professional lives, users have become increasingly dependent on connecting to public hotspots – especially when …

Don't miss

Cybersecurity news