News

ATT security.jpg

AT&T joins global cyber security alliance formed by Etisalat, Singtel, SoftBank and Telefónica

Alliance combines resources and capabilities of telecom operators to help protect all types of businesses from the growing threat of sophisticated cyber-attacks. With the inclusion of AT&T, the Alliance greatly increases its global presence

more
mike hamilton.jpg

Ziften expands Board of Directors with appointment of California investment executive and entrepreneur Dave Lin

Investment executives/entrepreneurs Patrick O’Reilly and Jonathan Hung join Ziften as Board Observers more
Vera Jourova CE.jpg

International data flows: The European Commission launches the adoption of its adequacy decision on Japan

Following the conclusion of the EU-Japan talks on personal data protection in July 2018, the Commission yesterday launched the procedure for the adoption of its adequacy decision. The EU and Japan affirm that, in the digital era, promoting high privacy and personal data protection standards and facilitating international trade must and can go hand in hand

more
more news

Products

cameron coursey.png

AT&T and Ericsson team up on IoT cybersecurity

AT&T and Ericsson are joining forces to offer comprehensive testing to help safeguard IoT devices from growing cybersecurity threats more
Rob Fry Jask.jpg

JASK enhances multi-cloud monitoring capabilities in ASOC platform

Market’s first cloud-Native SIEM uniquely delivers integrations and analytics to monitor and provide visibility into dynamic cloud workloads across AWS and Azure more
mike hamilton Ziften.jpg

Ziften announces rapid adoption of its cloud-delivered endpoint protection plus visibility and hardening platform (EPP+)

Enterprise security buyers and channel partners are quickly recognizing the value of Ziften’s single agent EPP+ solution for all endpoints more
more products

Interviews

Japan MWC 2013.JPG

Questions & answers on the Japan adequacy decision

What is an adequacy decision? An adequacy decision is a decision taken by the European Commission establishing that a third country provides a comparable level of protection of personal data to that in the European Union, through its domestic law or its international commitments
more
Cybersecurity Europe.JPG

Directive on Security of Network and Information systems, the first EU-wide legislation on cybersecurity

9 May was the deadline for the Member States to transpose into national laws the Directive on Security of Network and Information Systems (NIS Directive) that entered into force in August 2016. The NIS Directive is the first EU-wide legislation on cybersecurity

more
Brian Lord OBE.JPG

The Mind of the Hacker - Insights from GCHQ, MI6 and Israeli Intelligence

It used to be the trickery of the disinterested joker – bright youngsters pulling the data strings just to see what would happen. Then came criminals, adapting old con-trickery and thieving skills to the new cyber environment. Then it escalated to international gangs and now we are faced with political interest and rival shaping a post-truth world. Where are we heading? What is already happening? Vital questions must be addressed in this opening session before we turn to the technologies, solutions and strategies for securing the Cloud and Internet of Things. Brian Lord, OBE – former GCHQ Deputy Director for Intelligence and Cyber Operations – begins by describing the big picture, how it is evolving and where we could be heading. How is the balance of knowledge and power changing? And how will this affect our industry, business and society?

more
more interviews

Articles

Raj Samani.JPG

New IoT vulnerabilities illustrate risks of connected devices

McAfee encourages consumers and businesses to take action to secure Internet of Things more
5G Huawei.JPG

The debate about network security is more complex than Huawei. Look at Lenovo laptops and servers and the many other devices

Policymakers in the US and EU have focus on communications network equipment from Huawei and ZTE, noting that certain products should be restricted, if not banned outright. Strand Consult has covered the role of China in the world’s communications networks and in 5G for some time

more
Larry Ponemon.jpeg

Malware and malicious insiders accounted for one-third of all cybercrime costs last year, according to report from Accenture

Study also finds sharp rise in frequency and cost of ransomware attacks

more
more articles