NEWS

Role of the threat hunter 'often unclear'

ThreatQuotient has published the results of the SANS Threat Hunting 2019 study. The most important result is the worldwide confusion about the role and tasks of a threat hunter. The study, sponsored by ThreatQuotient and conducted by SANS, is based on data collected from 575 participating companies that either work with or operate their own threat hunting teams.

Read More


NEWS

A quantum security risk?

Almost a quarter of security leaders are experimenting with quantum computing strategies, as more than half worry it will outpace existing technologies.

Read More

NEWS

Cloud security for containers

McAfee has introduced McAfee MVISION Cloud for Containers, thereby becoming the first unified cloud security platform to integrate container security with its Cloud Access Security Broker (CASB) and Cloud Security Posture Management (CSPM) security solution. Leveraging NanoSec’s zero trust application visibility and control capabilities for container-based deployments in cloud environments, the solution provides customers with the ability to speed up application delivery while enhancing the...

Read More

NEWS

BitDam defends dairy

BitDam adds an important layer of protection for Scotland’s largest independent dairy.

Read More

 Skyhigh Pervasive Cloud Control enables Mobile-to-Cloud visibility and policy enforcement.
New solution extends network visibility to both sides of a proxy conversation for advanced threat...
Netwrix survey reveals that employees at 54% of educational organisations use cloud applications to...
Resilient Systems Incident Response Platform is part of collaborative development to stay ahead of...
EfficientIP, a leading provider of network security and automation solutions, specializing in DDI...
By Garry Sidaway, Global Director of Security Strategy at NTT Com Security.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more