NEWS

10 methods to mitigate IoT security threats

​​Cyber Security Services, an emerging cyber security consulting company, has released its top 10 strategies for securing IoT (Internet of Things) devices.

Read More

VIDEO

Cisco Endpoint Security Analytics built on Splunk

An endpoint analytics product built just for Splunk users!

Read More

BLOG

Cyber risk management – bringing security intelligence to the Board

Data breaches are costly. According to a recent Ponemon Institute study, the average breach costs an organisation $3.86 million. A separate study found that, although the share price of breach-affected companies shows its sharpest drop 14 days after the breach is made public, there is still a discernible impact on the organisation’s stock valuation three years post-event. By Josh Lefkowitz, CEO of Flashpoint.

Read More


VIDEO

The Executive Misconceptions of Cybersecurity

Watch as Magda Chelly, Managing Director and CISO on Demand, Responsible Cyber, talks with RSA CTO Zulfikar Ramzan, PhD about the misconceptions she sees executives having about the InfoSec industry.

Read More

McAfee Enterprise has introduced MVISION Private Access, an integrated approach to enable granular...
Highest priorities for IT teams are cybersecurity, cloud, data analytics and network infrastructure...
Intel Security report shows majority of IT budgets will focus on cloud, indicates need for...
New report details five ways hackers are exploiting organisations outside the firewall.
Leading agentless device security platform provider Armis, and cloud visibility and analytics...
Bromium has published “Endpoint Exploitation Trends 2015,” a Bromium Labs research report...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more