EXCLUSIVE: Forcepoint global channel chief talks strategyAs a solution sold 100% via the channel, cybersecurity solutions company Forcepoint places a strong emphasis on its partner relationships.
Salesforce continues to stumble after critical outage
“To all of our Salesforce customers, please be aware that we are experiencing a major issue with our service and apologise for the impact it is having on you."
Slack users urged to update to prevent security vulnerability
Businesses that use popular messaging platform Slack are being urged to update their Slack for Windows to version 3.4.0 immediately.
Secureworks Magic Quadrant Leader for Security Services
This is the 11th time Secureworks has been positioned as a Leader in the Gartner Magic Quadrant for Managed Security Services, Worldwide.
Google puts Huawei on the Android naughty list
Google has apparently suspended Huawei’s licence to use the full Android platform, according to media reports.
Using data science to improve threat prevention
With a large amount of good quality data and strong algorithms, companies can develop highly effective protective measures.
General staff don’t get tech jargon - expert says time to ditch it
There's a serious gap between IT pros and general staff, and this expert says it's on the people in IT to bridge it.
ZombieLoad: Another batch of flaws affect Intel chips
“This flaw can be weaponised in highly targeted attacks that would normally require system-wide privileges or a complete subversion of the operating system."
Forget endpoints—it’s time to secure people instead
Security used to be much simpler: employees would log in to their PC at the beginning of the working day and log off at the end. That PC wasn’t going anywhere, as it was way too heavy to lug around.
DimData: Fear finally setting in amongst vulnerable orgs
New data ranking the ‘cybermaturity’ of organisations reveals the most commonly targeted sectors are also the most prepared to deal with the ever-evolving threat landscape.
ExtraHop’s new partner program for enterprise security
New accreditations and partner portal enable channel partners to fast-track their expertise and build their security businesses.
Hackers increasingly ‘island hopping’ – so what does it mean?
Carbon Black's Rick McElroy discusses this new trend and what it means for the new age of cybercrime.
Trust without visibility is blind – Avi Networks
Enterprises are wanting to gain the trust of their customers, but are often found blindly defending themselves.
How to avoid becoming a cryptojacking victim - Bitglass
Large-scale cryptojacking is a lucrative business due to the popularity and value of cryptocurrencies like Bitcoin and Ethereum.
Samsung left Bixby & SmartThings code wide open to the public
If you’re someone who likes to use apps and platforms with some level of confidence that they’re secure, you may want to take another look at how much you trust big brands like Samsung.
PrinterLogic software vulnerable to remote attacks
The vulnerabilities affect PrinterLogic versions 220.127.116.11 and older.
Red Hat’s new role in enabling modern DevOps
The global open source vendors approach has come of age.
Leveraging cyber threat intelligence to benefit security posture
One out of five companies are still unsure of CTI’s value to their organisation.
SecureWorks speeds up threat detection through analytics
SecureWorks has embraced software-as-a-service (SaaS) to protect customers and transform the detect-investigate-respond process towards cyber threats.
Symantec, Ixia combine efforts to secure hybrid networks
Ixia’s CloudLens and Symantec Security Analytics now feature complete integration, which allows Symantec customers to gain real-time visibility into their hybrid cloud environments.
Security and mobility in a mobile-first world
Explore security, productivity, mobility, and what solutions are available to you. Here's how to move your organisation towards the mobile-first world, securely.Download
SolarWinds adds Mac capabilities to dashboards
Ability to manage both Mac and Windows devices on the same dashboard will streamline monitoring and management for MSPs.
Silverlake and Intel partner on edge security
With Intel’s software and hardware technologies, Silverlake’s technology stack designed for PAM will form a cybersecurity PAM product line.
Aruba announces automated security and wireless solutions
New AI-powered ClearPass Device Insight and expanded Wi-Fi 6 portfolio extend increases Aruba’s capabilities in security, connectivity and analytics.
DNS attackers love legacy systems - but how much damage can they inflict?
DNS infrastructure is vulnerable in terms of its security, availability, and integrity. An attacker just has to exploit the Domain Name System (DNS) on legacy systems and they get free reign.Download
CrowdStrike integrates firmware attack detection in endpoint protection
Most security products remain blind to attacks that attempt to leverage BIOS firmware to infiltrate endpoints, leaving organisations vulnerable to compromise.
Endace enhances analytics with 10GbE deep storage solution
The 8200 Series combines accurate packet capture with deep storage capacity, rapid-search capability and hosting density in a compact 2RU footprint.
Case Study: Infoblox protects the network that hosts City University’s curriculum
After recovering from a ransomware attack, City University began to work with Infoblox to bring its network security to the next level.Download
Security alert: More than 2 million IoT devices are now junk
More than two million security cameras, baby monitors, and smart doorbells are affected by security vulnerabilities that could allow cybercriminals to hack devices and spy on homes.
Email attacks targeting financial services up 60% - Proofpoint
These attacks are socially engineered to target specific people within financial services organisations who can execute requests on the attacker’s behalf.
Exclusive: Okta CSO on scaling security alongside business growth
Yassir Abousselham shares his unique insights as the chief security officer of a fast-growing identity and access management service provider.
Insider threats & breach reports: Why security needs more investment
Insider threats (those that come from within your organisation) are a serious concern - here's why.Download
Mimecast: Employee training must supplement application security
A company’s biggest security risk is unintentional employee negligence.
Four steps to Zero Trust network security - AlgoSec
The core principles of zero trust reflect the reality of today’s complex, heterogenous enterprise network environments.
61% of IT professionals have experienced serious data breach - McAfee
Data breaches are becoming more serious as cybercriminals continue to target intellectual property.
SIEM can improve security or make it worse – here’s how to get it right
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.Download
Exabeam plans to use $75m fund to leave legacy SIEM vendors in the dust
SIEM provider Exabeam predicts that it will leave legacy providers in the dust, and it’s all down to a US$75 million Series E funding that will be used to ‘displace’ legacy security management vendors.
Can your vulnerability assessments protect your organisation?
33% of enterprises surveyed are at a low maturity, conducting only limited assessments of selected assets.Download
The 3 essential elements to consider with SaaS security
Speed, ease of use, and low capital expenses are just some of the factors driving the continued growth in SaaS security adoption.Download
Microsoft achieves FIDO2 certification for authentication solution
FIDO2 is a set of standards that enables easy and secure logins to websites and applications via biometrics, mobile devices and/or FIDO Security Keys.
Kemp: Three common IoT security pitfalls
Research shows that IoT is disrupting markets and IT organisations worldwide, changing economics and agility in many markets.
Study: Is it possible to detect breaches as they happen
Breaches often happen when businesses least expect them, causing slow reaction times and possibly catastrophic loss.Download
Another cryptocurrency exchange breached, but at least investors are safe
It takes patience to steal more than 7000 Bitcoin (approximately US$41 million) from cryptocurrency exchanges, despite global awareness that such attacks are becoming more prolific.
Two years on: Have organisations learnt from WannaCry?
This month marks a special anniversary – two years since one of the world’s most destructive pieces of ransomware ever caused chaos.
Cybera brings remote network operations into clear focus
SD-WAN and security service provider Cybera has released a cloud-based management solution designed to provide deeper insight into remote network operations.
Navigating the complicated world of DNS security
Over the years, DNS, both the protocol and the servers, have become the target of a variety of attacks, including the Lion worm.Download
Businesses failing to secure BYOD - Bitglass
Report finds that 74% of organisations allow BYOD but nearly half lack clear security policies and best practices.
Axis: How artificial intelligence will impact security
AI systems are able to analyse huge amounts of data, which is advantageous when an employee has to review hours of surveillance images.
Whitepaper: The Mobile Risk Matrix - how exposed are you?
The proliferation of cloud services has increased the attack surface to include applications, devices, networks, and external web and content delivery methods.Download
BeyondTrust updates remote access solution
Updates in version 19.1 include AWS availability, UI improvements, Mojave support, and more.
How a virtual CISO can become part of a managed security regime
Security-as-a service is a particularly compelling option for smaller businesses that perhaps do not yet have the resources to adequately maintain a cybersecurity regime internally.
Bait, hook and catch – targeted spearphishing on the rise
Spearphishing attacks, where a threat actor impersonates employees or popular web services, are on the rise.
D-Link security cams vulnerable to spying
Security researchers at ESET have discovered serious security holes in the D-Link DCS-2132L cloud camera.
LogRhythm SIEM named Gartner Customer Choice
This is the third consecutive time LogRhythm been recognised as a Customers’ Choice, which is determined based on independently verified feedback and ratings
What your privacy means to Google - and what it's doing about it
Google has declared that it’s all about making privacy work for everyone – despite its long-held reputation as an information harvester.
Paranoid Android? Examining three key trends in Android malware
It definitely doesn’t mean you are paranoid if you’re worried about Android security: the threat landscape is growing in every dimension.
Trustwave brings database security scanning to the cloud
Trustwave DbProtect allows customers to protect big data stores across (and in between) major cloud services.
WatchGuard expands partner program with financial incentives
In the expanded program, partners can earn WatchGuardONE status by specialising in just one of the available product families.
It's 'lights out' for two more dark web marketplaces
Don’t be fooled if you see talk that Wall Street Market has been taken down – because it’s most likely not what you think.
Blockchain, edge, AI & ML - Microsoft goes all-out for devs
Microsoft is launching a swath of new developer technologies and Azure services designed to bring AI, blockchain, mixed reality, and IoT to the forefront of development.