LogRhythm kommentiert: Spotify bestätigt unautorisierten Zugriff auf IT-Systeme

Der Musik-Streamingdienst Spotify hat bestätigt, Opfer einer Cyberattacke geworden zu sein. Auf seiner Website berichtet das Unternehmen, dass es einige unautorisierte Zugriffe auf seine Systeme und internen Firmendaten aufgespürt hat

Read More

7 Elements expands team after period of high growth

IT security testing consultants, 7 Elements, has announced the expansion of its UK wide team with the appointment of three key roles, and with the imminent recruitment of an additional two team members. The business has enjoyed growth in the last twelve months and requires an expansion of the team to meet the increasing need from the financial services and oil and gas industries.

Read More


More than 1 in 8 IT security pros can access previous employers’ systems using old credentials

Just over 13 percent of IT security professionals admit to being able to access previous employers’ systems using their old credentials, a new survey from Lieberman Software Corporation reveals.

Read More

Worldwide Threat Intelligence Security Services spending to exceed $1.4 billion by 2018

A consistent bombardment of unknown, targeted, and adaptive cyber threats are wreaking havoc in the enterprise and driving the expansion of threat intelligence security services (TISS) that are specifically designed to detect advanced persistent threats (APTs), advanced malware, and previously unidentified attacks. According to new research from International Data Corporation (IDC), worldwide threat intelligence security services spending will increase from $905.5 million in 2014 to more than...

Read More

CA Technologies has completed the acquisition of privately held Xceedium, Inc., a provider of...
New survey offers unique perspective into the state of privacy and the Apple-FBI debate.
Ex-Fortinet Global Account Director, Chris Smith, joins encryption leader to drive and grow channel...
McAfee sees attackers shift from mass-spread campaigns to fewer, more lucrative targets.
The path to policy righteousness demands the right processes, visibility and automation – but...
Zscaler has published a new study that examines hidden vulnerabilities found in enterprise virtual...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more