Networks

The state of cybersecurity: What 2016 will bring

By Gerard Bauer from:  SECURITY FEATURES With cybersecurity breaches dominating 2015’s headlines on a regular basis, it is clear that today’s organisations simply cannot defend against every threat. Savvy cybercriminals are continuing to find attack entry methods that bypass or defeat traditional security defences, so threats remain undetected until damage has been done. It’s...

It-Security

From IoT threats to forensics

Cybersecurity is not about to go away. Quite the opposite, with spending on defending IT systems estimated to balloon from $77bn this year to $170bn in 2020, according to MarketsandMarkets. That view is backed up by researchers at Indra’s Cybersecurity Operations Center, located in San Fernando de Henares, Madrid, who expect the security sector to...

Application-security-magic-quadrant-report-gartner-2015-free-download-read-leaders

Who are the leaders in the latest application security Gartner Magic Quadrant?

Highlights from the 2015 Gartner Magic Quadrant for application security testing By John P. Mello Jr. Aug 27, 2015 Gartner recently published its 2015 Gartner Magic Quadrant for Application Security Testing (AST) report, which analyzes security vendors’ static, dynamic, mobile, and interactive application testing capabilities. The report is based on analysis from 350 application-security-related...

Download

The insider versus the outsider: Who poses the biggest security risk?

by Chris Stoneff – VP of technical management at Lieberman Software – Wednesday, 19 August 2015. Today, many organizations are under continuous attack from nation-states or professional cyber criminals. One of the main focuses for IT security teams is stopping intruders from gaining access to assets on the corporate network. However, this strain on...

SMB

Virtualization doubles the cost of security breach

Virtualization doubles the cost of security breach By Maria Korolov |CSO | 24 Aug 15   When a security incident involves virtual machines in either a public or private cloud environment, the recovery costs double compared to that of a traditional environment, according to a new report from Kaspersky Lab. In a survey of...

Security-Companies-to-Watch

10 Young Security Companies to Watch in 2015

By Tim Greene Follow Network World | Aug 18, 2015 5:34 AM PT Based on the continued interest in security startups from venture capital investors, these companies will continue to proliferate. Here are 10 worth watching. The emergence of cybersecurity startups has continued unabated as entrepreneurs vie for corporate customers seeking new technologies to...