Leaving the door open for hackers

Courion asks: how secure are your service accounts? Most don’t realise the number of service accounts that exist within their organisation, frequently with default password settings created during software installation still in place. The problem is, service accounts typically provide privileged access to valuable and confidential data. Because service accounts are not proactively managed, they represent an especially attractive target to a hacker.

Read More



Sophos announces expanded security offerings through AWS Marketplace

Sophos has announced the expansion of their product portfolio on AWS Marketplace with the addition of a new secure server option for customers on Amazon Web Services (AWS). Building on the success of the Sophos UTM Next Generation Firewall product, which is offered through AWS Marketplace, the new Sophos Secure OS delivers comprehensive security bundled with CentOS.

Read More

Imperva introduces Cloud Reference Architecture

New Reference Architecture provides validated blueprints for implementing comprehensive web application security on Amazon Web Services.

Read More

Painful compliance audits ahead

Frightening lack of awareness of the European Commission’s draft bill that unifies and simplifies data protection across 28 countries within the EU starting late 2014/early 2015.

Read More

Netwrix Auditor helps Credissimo optimise security and auditing routines to achieve day-to-day...
 NCC Group, global cyber security and risk mitigation expert, is offering unique threat...
Alert Logic has published the results of a survey conducted amongst 317 security professionals...
Following the inaugural Identity Management Day, survey of IT decision makers finds that protecting...
Ivanti has published new findings from a survey studying the impact of the move to “work from...
Security concerns intensify with challenges over remote worker access.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more