Ransomware modifications double year-on-year in Q2 2019 - Kaspersky
According to Kaspersky data, 232,292 unique users were targeted by such attacks – 46% more than a year ago, in Q2 2018 (158,921).
Nintex bolstered by independent security report
Successful threat hunting requires curation & collaboration
The fascinating way Microsoft is making a social impact
Security defensive blue teams failing to catch offensive red teams - Exabeam
67b emails rejected due to 'highly malicious attack techniques'
Puppet launches vulnerability remediation product
Popular enterprise printers riddled with security risks
Researchers from NCC Group analysed different aspects of six mid-range enterprise printers manufactured by HP, Ricoh, Xerox, Lexmark, Kyocera, and Brother.
430,000 people hit with financial malware
Financial malware, that is malware that targets finances, cryptocurrencies and web-money services, has increased by 7% from the same period last year, according to new research from Kaspersky.
Netflix film The Great Hack raises serious questions about data privacy issues
Last weekend a group of privacy advocates and experts gathered in the U.S. Capitol Visitors Center to discuss issues highlighted by The Great Hack documentary.
BitSight announces enterprise analytics to help security leaders manage risk
The solution provides visibility into which groups have the biggest impact on their organisations' overall cyber risk posture and helps identify areas for security performance improvement.
Genetec shows impressive growth, says IHS Markit
IHS has named Genetec one of the fastest-growing access control software manufacturers in the world, according to the latest IHS Report.
Business ransomware detections spiking - Malwarebytes
Ransomware attackers are targeting large, ill-prepared public and private organisations with easy-to-exploit vulnerabilities.
Ping Identity launches private cloud identity solution
Enterprises need a dependable way for customers, employees and partners to conveniently sign-on to their services and applications.
CEOs falsely led to believe company is GDPR compliant - Delphix
Delphix spoke to CISOs, CIOs, testers and developers at UK companies to find out the state of play at their organisations.
CrowdStrike launches threat-scoring platform
CrowdScore is a metric that enables CSOs to instantly see the real-time threat level their organisations are facing, allowing them to mobilise resources to respond.
Jamf extends Apple expertise through security firm buyout
IT and Apple specialist firm Jamf has acquired Mac-focused endpoint security provider Digita Security.
CrowdStrike report lists cybersecurity adversary rankings
In today’s ever-evolving cyber landscape, speed is essential for effective cyber defence.
Check Point: Attackers executing commands remotely with latest malware
Threat actors are quick to try and exploit new vulnerabilities when they emerge, before organisations have had the chance to patch them.
The dark side of apps: Security threats on the rise
"Think about it, unsecured Wi-Fi, spoofing, phishing attacks, ransomware, spyware... mobile devices make for the perfect target."
ESET: Ignoring human element in cyber safety a mistake
"We believe that when employees are aware of their potential blindspots, they are naturally more invested and better prepared to be wary of things that may not seem quite right."
SolarWinds announces updates to web performance monitoring products
With the improved functionalities, technology professionals managing every type of environment can monitor website availability and performance.
Keysight solution helps prevent cyber-attacks on connected vehicles
Potential issues identified post-production, with the risk of recalls, cost orders of magnitude more to repair than when found during pre-deployment testing.
F5 Networks' BIG-IP load balancer product vulnerable to attack
Organisations that use F5 Networks BIG-IP load balancer should immediately check their configurations to ensure they are protected from potentially serious security issues.
Security teams spend 25% of their time chasing false positives
The report also showed that teams were also concerned about investigating actionable intelligence and building incident timelines as well as cleaning, fixing and/or patching networks.
Gartner, Forrester name Retarus for Email Security
The information logistics firm was listed as one of the twelve most important providers of email security services in the world by Forrester Research.