Please turn on your JavaScript for this page to function normally.
Security analytics solution identifies attacks in historic data

Arbor Networks is showcasing at Infosecurity Europe 2014 its Pravail Security Analytics, whose unique looping capability can be used to identify and establish an attack …

300% growth in enterprise attacks across UK and Ireland

At Infosecurity Europe 2014, FireEye announced the release of its Regional Advanced Threat Report for the United Kingdom and Ireland (UKI). Detailing malicious activities …

Airbus Group debuts SCADA research project to mitigate ICS vulnerabilities

Airbus Group will highlight this week at Infosecurity Europe 2014 its range of technologies, services and a cutting edge research project to help governments and industry deal …

Fortinet unveils FortiOS 5.2 to fight APTs

Fortinet unveiled a major update to the FortiOS network security operating system that powers the FortiGate platform at Infosecurity Europe 2014. This release incorporates …

Webroot delivers APT protection for enterprises

Webroot announced the release of BrightCloud Security Services and BreachLogic Endpoint Agent, two cloud-based security offerings designed to help enterprises address the …

McAfee expands Comprehensive Threat Protection

At the RSA Conference, McAfee announced expanded capabilities to find, freeze, and fix advanced threats faster to win the fight against advanced and evasive targeted attacks. …

Top ten points in the fight against cybercrime

At a summit of regulators and intelligence chiefs yesterday, the business secretary, Vince Cable, issued a timely warning to all in attendance of the vulnerability of …

Motivation and techniques of world’s most sophisticated cyber attackers

CrowdStrike released “CrowdStrike Global Threats Report: 2013 Year in Review,” the product of its year-long study of more than 50 groups of cyber threat actors. …

Top 7 security concerns for 2014

AhnLab announced its “Top 7 Security Concerns for 2014”. Because AhnLab is immersed in the cyber trenches and the cloud, its team is very experienced monitoring …

What’s the greatest security risk?

While boardrooms across the U.S. report growing prioritization of endpoint security, risk continues to grow and evolve and IT departments are racing to keep up, according to a …

The state of targeted attacks

Trusteer announced the results of a recent study on the State of Targeted Attacks, which took into consideration the feedback from over 750 IT and IT security practitioners …

The operations of a cyber arms dealer

FireEye researchers have linked eleven distinct APT cyber espionage campaigns previously believed to be unrelated, leading them to believe that there is a shared operation …

Don't miss

Cybersecurity news