ISACA outlines five principles for effective information and technology governance

In new guidance issued today, global IT association ISACA outlines five principles organizations can use to effectively govern and manage their information and technology.

Read More

Kemp introduces load balancers with native WAF

Web application firewall (WAF) services will now be natively integrated in the KEMP Technologies LoadMaster Operating System (LMOS) for load balancers. This will enable secure deployment of web applications, preventing Layer-7 attacks while maintaining core load balancing services and ensuring superior application delivery performance, high availability and scalability.

Read More

MTI bolsters security offering with EnCase

Guidance Software brings digital investigation capabilities to the MTI Security Practice.

Read More




Without regulation, the IoT security threat will continue to grow in 2019.
A leading cybersecurity provider, US company ThreatLocker® Inc., has opened a new Dublin...
CyberRes’ annual State of Security Operations study indicates 79% of SOCs increased adoption of...
Security challenges can only be met with a steadfast commitment to improving cyber security...
Prioritising Privileged Access Management helps protect businesses from insider risks and external...
Amidst the Great Resignation, frontline cybersecurity and DevOps defenders are spending four+ hours...
Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more