Disagreement over security objectives

According to findings from a new global Ponemon study: “2015 Global IT Security Spending & Investments” IT security and IT leaders and their staff members do not agree on security objectives. The study, commissioned by information security leader Dell SecureWorks, surveyed 1,825 IT security and IT leaders and their staff. The participants were based in 42 countries in the following regions: North America, Europe, Middle East, Africa, Asia Pacific, Japan and Latin America. The...

Read More

DDoS attacks resemble Advanced Persistent Threats in sophistication

Imperva has released its Q2 2015 Global DDoS Trends Report. The report findings, based on over 3,000 mitigated DDoS attacks and 60 million blocked bot sessions across all sites which were protected using Imperva Incapsula, show a high frequency and long duration of DDoS attacks against organizations during the period from March 1 through May 7, 2015.

Read More

Cisco embeds security everywhere

Cisco has introduced new offerings to embed security throughout the extended network – from the data center out to endpoints, branch offices, and the cloud – for pervasive threat visibility and control. By integrating security everywhere, enterprises and service providers gain the ability to deliver the threat-centric security requirements demanded by today's dynamic threat landscape and capture emerging business opportunities created by the rise of the Digital Economy and the...

Read More

Confidence and confusion surround network security

While most C-Level executives are sure their infrastructure is safe, many more admit that better security will only come with enhanced visibility into the network.

Read More


Proofpoint extends targeted attack protection

Industry-leading advanced malware protection capabilities to secure users across LinkedIn, Facebook and Twitter.

Read More

Industry demand for URL filtering grew 10 times since last year – slower progress compared to...
Infosys and Interbrand have revealed that the potential risk in brand value of a data breach to the...
Cybercriminals leverage Microsoft Office exploits, fileless PowerShell threats, Locky...
What's keeping IT professionals awake at night? Data storage, data access and data sharing.
‘IT Trends Report 2015: Business at the Speed of IT’ explores the current state of...
Only 12% of chief information security officers (CISOs) excel in all four categories of the Gartner...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more