After several months in decline, Exploit kit infections show sharp uplift and deliver a variety of threats, says Check Point…
Browsing: Identity and access management (IAM)
New capabilities help customers reduce the risk of downtime and data theft TEMPE, Ariz – Limelight Networks, Inc. (Nasdaq: LLNW), a global…
Make no mistake about it: employee behavior is, has been, and will continue to be the greatest vulnerability to a…
The Government has released a survey detailing business action on cyber security and the costs and impacts of cyber breaches and attacks. This comes…
Following the news, that Georgia state officials are investigating the theft last week of equipment from a Cobb County precinct manager’s car…
It’s not a SIEM. But it does address SIEM user dissatisfaction with a software platform that combines advanced threat detection…
Intended Audience: CISO / CIO / Security Directors Threat Intelligence Analysts Technical Content: Low Summary On March 4, 2017, a…
One in five British companies has been hacked by cyber criminals over the past year, a new survey has indicated.…
Mark McArdle, CTO at cyber security company eSentire, along with Ben Hammersley, BBC journalist and technologist, recently compiled a list…
Fog computing may be the next big thing for the Internet of things. The fog computing market, valued at $22.3…