Vendor News

Back to homepage

Collaboration and Information Sharing Should Also Happen Internally

We often discuss the importance of external collaboration and information sharing in security. Frequently overlooked, however, is the importance of also collaborating and sharing information internally among the various teams and functions

Microsoft teams up with NCSC to simplify workplace security

Businesses can meet latest Government cyber security guidelines in seconds with new downloadable pack.A new downloadable pack can significantly reduce the time it takes UK businesses and organisations to meet

Qualys integrates with Google Cloud Platform’s Security Command Centre

Qualys and Google Cloud Platform can now play nicely together with the launch of the security firm’s Cloud Security Command Center (Cloud SCC) integration.The security and data risk platform will

Global WAN survey highlights the importance of network simplification

Cato Networks, provider of the global SD-WAN as a service Cato Cloud, released the findings of its enterprise WAN market study.The report, “State of WAN 2018: Too Complex to Ignore,”

SecOps reality gap: 85% say practicing SecOps is a goal, 35% actually do

More than half of companies (52 percent) admit to cutting back on security measures to meet a business deadline or objective.Based on a survey of over 200 senior-level operations and security

CrowdStrike Reports Average Breakout Time for Cyber-Attacks

Cyber-security vendor CrowdStrike released its 2018 Global Threat Report on Feb. 26, providing insights from the company’s globally distributed network that processes approximately 100 billion events a day. Among the

PhishMe Announces Acquisition and Rebrand as Cofense

A consortium of private equity firms has announced the acquisition of PhishMe, which has been rebranded as Cofense.With the backing of multiple private equity firms, including BlackRock and Pamplona Capital

AdaptiveMobile detects sophisticated attacks on signalling networks across five continents

AdaptiveMobile Security, the world leader in mobile network security, today announced it has detected increasingly sophisticated attacks via the next generation of signalling protocols being used for 4G. In new

Risk and Compliance Management Moves Towards Collaboration

Managing the impact of a data breach is the top priority in risk management, yet respondents in a recent survey also reported that they lack the budget and resources to

Expected changes in IT/OT convergence and industrial security

Ten years ago, I was brought into the industrial security arena by a top company executive in who was convinced that we needed traditional endpoint protection on smart meters. I