ATTACKERS ARE BYPASSING PERIMETER

    Attackers are Bypassing Perimeter Detection Methods With Relative Ease According To Survey

    More IT Professionals are Operating Under the Assumption of Compromise More organizations are operating under the assumption that their network has already been compromised, or will be, according to a ...
    Read More
    Sheds Light on Emerging Security Risks

    Annual Threat Report Sheds Light on Emerging Security Risks

    Dell  announced the results of its annual Threat Report, which leverages research from Dell’s Global Response Intelligence Defense (GRID) network and telemetry data from Dell SonicWALL network traffic to identify ...
    Read More
    Duo Security Presents Anatomy of a Data Breach

    Duo Security Presents Anatomy of a Data Breach

    Duo Security's infographic presents an accurate idea of what the data breach landscape was in the past year ...
    Read More
    Programming Language Choice Has Little Effect on Website Security

    Programming Language Choice Has Little Effect on Website Security

    A report by WhiteHat Security reveals that programming language choice has little effect on website security ...
    Read More
    Online Anon

    UK Divided Over Right To Online Anonymity And ‘Default On’ Filtering

    The issue of online anonymity is a complex one. The Internet has empowered many users by providing them with a platform to share views openly ...
    Read More
    Proxies

    68% Of UK Education Organisations Are Battling With Anonymous Proxies

    A new research report issued by Bloxx has found that 68% of the UK's education organisations are facing an ongoing battle with anonymous proxies ...
    Read More
    Blancco

    Whitepaper: Data Erasure Solutions for Data Center and Cloud Computing Security

    Ongoing regulatory, consolidation, environmental and cloud computing developments mean that data centers need reliable, fast and flexible tools ...
    Read More
    cipher cloud

    A Brief History Of Ciphers (Infographic)

    A Brief History of Ciphers - This infographic from CipherCloud starts 1900 BC & covers a brief outline of the history behind Ciphers until 2010 ...
    Read More
    blackhole

    New Websense Research- Exploit Kits “Lacking P(a)unch”

    In the research blog, we show evidence after Paunch’s arrest of a popular criminal gang experimenting with the Magnitude exploit kit ...
    Read More
    Express Metrix

    Express Metrix Report Challenges Conventional Thinking on Audit Landscape

    43% of respondents report owing no money to their software vendor from the audit. Of those organizations that did owe money, most owed $50,000-$250,000 ...
    Read More
    Phishing

    The Top 10 Countries Hosting Phishing URLs

    In a new blog post, the Websense Security Labs investigated current phishing trends. The research includes the following, - The top 10 countries hosting phishing (The UK moved up from ...
    Read More
    Xmas list

    IT Security Tops Christmas Lists with 41% of Businesses Increasing Their Budget

    A recent study* suggesting that 41% of organisations are planning to increase their IT security budget by 16% in 2014 ...
    Read More
    cybersquatting

    Cyber Squatters & Phishers Are Winning

    Nowadays, illegal online activities such as Phishing and Typosquatting are growing at an alarming rate ...
    Read More
    targeted attacks

    Trusteer reports on the State of Targeted Attacks

    Endpoint cybercrime prevention specialist Trusteer, an IBM company, has announced the results of a recent study on the State of Targeted Attacks ...
    Read More
    Top 100

    Are The Top 100 Global E-commerce Websites Protecting You?

    The statement is a result of research by the information security services company into the Top 100 global e-commerce websites ...
    Read More
    Mark Kedgley NNT

    Whitepaper: PCI DSS Version 3.0: New Standard but Same Problems?

    This whitepaper examines the implications of the new PCI DSS Version 3.0 for businesses and looks at how the requirements can help to minimise the threat of card data theft ...
    Read More