Cyber criminals targeting the gaming industry at an alarming rate
New research from Akamai shows the gaming community is quickly becoming one of the most highly targeted industries for cyber attacks, with hackers largely driven by gaining consumer credentials.
Case study: City University ups ransomware defences after attack
App chat – it’s time to talk to employees about workplace tools and apps
How to avoid common mistakes when moving to the cloud
Exclusive: Okta’s APAC GM on its expansion strategy
Untagged data a major risk to businesses - Veritas
VDI solution brings 50% time and TCO savings to school district
CrowdStrike: Best practices for mobile device security
The workforce is more reliant than ever on business-critical applications, which can access confidential information from multiple devices at any time and anywhere.
Emotet drove 61% of malicious payloads in Q1 2019 - Proofpoint
“The massive shift in Emotet’s prevalence and classification highlights just how quickly cybercriminals are adapting new tools and techniques across attack types.”
Exclusive: Veeam’s business development VP looks ahead
Backup and disaster recovery company Veeam is finding new opportunities in partnerships after marking $1billion in bookings this year.
Sophos acquires Rook Security to provide managed detection and response
As a channel-first security provider, Sophos will deliver the new MDR services through its network of approximately 47,000 channel partners worldwide.
Forrester names Proofpoint leader in enterprise email security
Email remains the preferred attack vector for cybercriminal activity, from low-level cybercriminals to nation states.
Whitepaper: Unlocking SIEM to reduce cost and improve performance
SIEM can be expensive, eat up storage, and overwhelm IT teams with the sheer differentiation of log data formats that they need to process.
Is the pain of resetting passwords finally over?
"It's now the role of businesses to take the responsibility off the end user, by coming up with a more intelligent strategy than a password expiry policy."
A10 Networks adds zero-day automated protection (ZAP) to DDoS Defence
Today’s DDoS attacks are more prevalent, multi-vector in nature and morph over time.
Huawei calls on the US to adjust its approach to cybersecurity
"There is no gun, no smoke. Only speculation.”
Nearly half of all employees are willing to share business secrets
Insider threat is real, according to a new report that highlights employee behaviour around sharing corporate information.
Experts comment on US Customs data breach
The United States Customs and Border Protection agency has been responsible for the leaking of tens of thousands of images of travellers and license plates.
How to configure syslog-ng in a Docker infrastructure
Whether it's user activity, performance metrics, network traffic or any other log data, syslog-ng can collect and centralize log data.
RapidFire Tools helps MSPs and SMBs navigate cybersecurity liability
Many cyber insurance policies require businesses to adhere to specific conditions in order to be paid out if a claim is filed.
HP study illuminates booming counterfeit print supply industry
Businesses that purchase print supplies are in danger of falling victim to the multi-billion dollar industry of counterfeits and fakes.
Is it possible to enjoy container agility and be secure?
In line with ever-changing demands on IT, containers are exploding in popularity and look set to become the preferred method for deploying applications.
Silver Peak and NSC announce global partnership
The new Silver Peak-based managed SD-WAN services are available immediately to NSC enterprise and service provider clients and partners in 180 countries
Are you fully utilising log messages to understand your systems?
IT environments generate log messages with a variety of functions and significance to an organisation – but they’re only useful if they trigger the necessary responses.
Retailers failing customers when it comes to data security
Retailers are failing to adequately secure customer’s data, especially when it comes to application development processes (DevOps), new research from Claranet indicates.
Palo Alto Networks introduces new cloud security suite
It aims to be the new benchmark in cloud security, transforming the cloud journey by simplifying access, data protection, and application security.
Whitepaper: Equipping your DNS with security, availability, and integrity
Attackers can conduct DNS attacks, including DDoS attacks that can take servers offline for minutes, hours, days, or even weeks.
Why one in three CEOs would fire the person responsible for a breach - Nominet
The research surveyed more than 400 C-suite executives from enterprises.
MistNet raises $7m funding windfall for edge security
MistNet aims to provide threat visibility on desktop, data center, public cloud, or IoT environments.
What to do with your logs after storing them in Elasticsearch
Elasticsearch, an easy-to-scale and easy-to-search NoSQL data store, has been gaining momentum as the ultimate destination for log messages in recent years.
Check Point launches cloud security analytics solution
CloudGuard Log.ic detects cloud anomalies, blocks threats and intrusions, and delivers context-rich visualisations.
NEC named Frost & Sullivan Biometrics Company of the Year
The award recognises NEC's foresight in innovating and developing biometric solutions for the future that maximises customer value and experience.