Security

Research: Cyber extortion attacks on the rise – Mandiant M-Trends Report
FireEye has released the 2016 Mandiant M-Trends Report which reviews cyberattacks it has responded to…

WatchGuard Delivers High-Speed, Modular UTM Appliance
Firebox M4600 and M5600 provide distributed enterprises with security, speed, and flexibility WatchGuard Technologies has announced the…

The Advanced Threat Platform that Connects Attacks Across the Internet with Internal Enterprise Networks
Empowering security teams to find and prove active attack campaigns 10x more effectively than SIEM…

Blue Coat and NetApp to provide high-density storage for industry-leading security incident response and forensics solution
New solution provides customers with significantly longer captured history of breach activity for more effective…
Verizon and Splunk join forces to advance threat detection for enterprises
Verizon enhances managed security services portfolio with Splunk security solutions Verizon Enterprise Solutions and Splunk…

Should organisations be collecting metadata?
The recently-enacted Amendment to the Telecommunications Act requires telecommunications providers to retain details of online…

Eight cyber security commandments all workers should follow
Despite the growing visibility of cyber security issues, many people still possess a relatively uninformed…

Ixia launches Vision ONE for end-to-end network visibility
Turnkey device optimises network security without sacrificing performance Ixia has launched Vision ONE. This turnkey…

IT roles are changing: how to avoid becoming obsolete due to digital disruption
The evolution of the technology driving digital disruption has the potential to make many IT…

Five BYOD disasters organisations can avoid with good planning
The ‘bring-your-own-device’ (BYOD) approach to business technology has many advantages. If done correctly, it can…

Pirated iOS App Store’s Client Successfully Evaded Apple iOS Code Review
Apple’s official iOS App Store is well known for its strict code review of any…

New Android Trojan “Xbot” Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom
We recently discovered 22 Android apps that belong to a new Trojan family we’re calling…

Hewlett Packard Enterprise Identifies Top Risks for Businesses Today: Application Vulnerabilities, Patching and Malware Monetisation
Annual Cyber Risk Report reveals attack sophistication on the rise while organisations struggle to keep…

Akamai Revolutionises Bot Management
Industry-first Web Security Technology – Akamai Bot Manager – Designed to Allow True Management of…