News

mike hamilton.jpg

Ziften expands Board of Directors with appointment of California investment executive and entrepreneur Dave Lin

Investment executives/entrepreneurs Patrick O’Reilly and Jonathan Hung join Ziften as Board Observers more
Vera Jourova CE.jpg

International data flows: The European Commission launches the adoption of its adequacy decision on Japan

Following the conclusion of the EU-Japan talks on personal data protection in July 2018, the Commission yesterday launched the procedure for the adoption of its adequacy decision. The EU and Japan affirm that, in the digital era, promoting high privacy and personal data protection standards and facilitating international trade must and can go hand in hand

more
Vera Joureva Japón CE.jpg

The European Union and Japan agreed to create the world's largest area of safe data flows

The EU and Japan successfully concluded their talks on reciprocal adequacy. They agreed to recognise each other's data protection systems as 'equivalent', which will allow data to flow safely between the EU and Japan
more
more news

Products

Ziften Roark Pollock NetEvents.JPG

Ziften enters UK - Ireland with Endpoint Protection; Partners with Microsoft Windows Defender ATP specialist Threatscape

Ziften partners with Threatscape delivering a cloud-based, “single pane-of-glass” to protect, detect, and respond to advanced cyber-attacks on all endpoints more
Ziften Roark Pollock.JPG

Ziften continues to expand global business opportunities with its Microsoft Windows Defender ATP partnership

Ziften continues to grow and expand its cyber-security collaboration with Microsoft through the addition of new product innovations with AI-based multi-vector threat prevention in its Zenith endpoint protection platform, expanded global sales reach, and successful customer deployments

more
Mike Hamilton Ziften.jpg

Ziften adds advanced AV to the Zenith endpoint protection platform to stop cyber-attacks before damage or loss can occur

Advanced anti-virus (AV) capability detects multiple attack vectors to prevent file-based, fileless, and in-memory attacks with the power of artificial intelligence (AI) and the cloud

more
more products

Interviews

Japan MWC 2013.JPG

Questions & answers on the Japan adequacy decision

What is an adequacy decision? An adequacy decision is a decision taken by the European Commission establishing that a third country provides a comparable level of protection of personal data to that in the European Union, through its domestic law or its international commitments
more
Cybersecurity Europe.JPG

Directive on Security of Network and Information systems, the first EU-wide legislation on cybersecurity

9 May was the deadline for the Member States to transpose into national laws the Directive on Security of Network and Information Systems (NIS Directive) that entered into force in August 2016. The NIS Directive is the first EU-wide legislation on cybersecurity

more
Brian Lord OBE.JPG

The Mind of the Hacker - Insights from GCHQ, MI6 and Israeli Intelligence

It used to be the trickery of the disinterested joker – bright youngsters pulling the data strings just to see what would happen. Then came criminals, adapting old con-trickery and thieving skills to the new cyber environment. Then it escalated to international gangs and now we are faced with political interest and rival shaping a post-truth world. Where are we heading? What is already happening? Vital questions must be addressed in this opening session before we turn to the technologies, solutions and strategies for securing the Cloud and Internet of Things. Brian Lord, OBE – former GCHQ Deputy Director for Intelligence and Cyber Operations – begins by describing the big picture, how it is evolving and where we could be heading. How is the balance of knowledge and power changing? And how will this affect our industry, business and society?

more
more interviews

Articles

Joseph Bradley Cisco.jpg

New Cisco study predicts dramatic change in IT operations as CIOs embrace analytics and automation

88 percent of respondents identify investing in IT operations as key to driving premptive practices and an enhanced customer experience

more
Peter Firstbrook.jpg

Gartner identifies the top six security and risk management trends

Business leaders are becoming increasingly conscious of the impact cybersecurity can have on business outcomes. Gartner, Inc. said that security leaders should harness this increased support and take advantage of six emerging trends, to improve their organization’s resilience while elevating their own standing

more
Michela Menting Abi Research.png

Cyberthreats to the utility infrastructure very grave according to new report

The US$8 billion spend to secure smart utilities inadequate; Cyberthreats to the utility infrastructure grave more
more articles