Insufficient staffing levels and quality, together with poor orchestration between too many security point products mean that complete breach intolerance is an aspiration not...
Hi, what are you looking for?
Insufficient staffing levels and quality, together with poor orchestration between too many security point products mean that complete breach intolerance is an aspiration not...
NIST Proposes Ways for Organizations to Improve How to Identify, Recruit, Develop, and Retain Cybersecurity Talent
The UK government has announced its plans for a new Data Protection Bill. This was foreshadowed in the Queen's Speech of 21 June when...
On July 31, 2017, a hacker claimed to have been deep inside Mandiant's infrastructure.
Webroot commissioned Wakefield Research to query 600 SMB IT decision makers in the US, UK and Australia to discover current attitudes towards IT security...
CylancePROTECT Home Edition Will Allow Businesses to Offer Protection to Employee-Owned Devices at Home
After years of warnings from security experts and researchers, the Internet of Things (IoT) remains fundamentally insecure. Now a group of senators has introduced...
The Amazon Echo is an always-listening device designed to play music, answer questions via the Alexa voice service, and control connected home devices such...
A hacker or group of hackers claimed today to have breached FireEye's Mandiant. In a Pastebin post, they claimed, "It was fun to be...
Over the last few years, business email compromise (BEC) scams have rocketed -- costing victims $1.45 billion in 2016 alone (FBI report). Now a...
Seven hundred IT and security professionals were surveyed by McAfee to understand the current state and future development of threat hunting -- the active...