The six stages of a cyber attack lifecycle
In response to the shortcomings of prevention-centric security strategies, and the challenges of securing an increasingly complex IT environment, organizations…
Read MoreMarch 6, 2017
In response to the shortcomings of prevention-centric security strategies, and the challenges of securing an increasingly complex IT environment, organizations…
Read MoreMarch 6, 2017
Organizations have long sought to reduce their data breach detection time and increase their ability to mitigate breaches more quickly…
Read MoreMarch 3, 2017
One of the biggest issues is that unlike traditional bank robbers, who used to try to escape by driving their getaway cars across the state lines, modern cyber-crooks hide overseas…
Read MoreMarch 1, 2017
Bill Smith, senior vice-president of worldwide field operations at LogRhythm, talks to Computer Weekly about the big shift in cyber security…
Read MoreFebruary 8, 2017
Check out these quotes from a pile of executives who share their views on how anyone can be luckier…
Read MoreJanuary 30, 2017
UK businesses are struggling to detect, prevent and respond to cyber threats, a survey of 2,000 IT professionals from companies of various sizes across 14 industry sectors has revealed…
Read MoreJanuary 19, 2017