CounterTack and NTT Security in new partnership

CounterTack and NTT Security have announced a partnership to broaden the latter’s Managed Endpoint Detection and Response Service with the former’s Endpoint Threat Platform (ETP). The firms say the prevention and protection at scale offered by ETP rounds out NTT Security’s service offering with capabilities that allow enterprises to detect and respond to unknown malware, insider threat, data […]
Global cyber security market worth $181.77 billion by 2021

Zion Market Research predicts that the global cyber security market will grow at a CAGR of 9.5% between 2016 and 2021. That equivalent to a total market value of $181.77 billion by the end of the forecast period, up from $105.45 billion in 2015. Zion says the major driving factor for the global cyber security […]
Network your way to success at the Security IT Summit

The next Security IT Summit takes place on July 3rd 2018 at the Hilton London Canary Wharf and will once again provide the leading platform for senior IT security professionals to meet with trusted solution providers, learn from the sector’s preeminent thought-leaders and network with peers. The 2017 instalment of the event was the most successful yet, with delegates able to […]
GUEST BLOG: Will GDPR impact CCTV?

By 2020 CCTV 25th May 2018 will mark the day where GDPR (General Data Protection Regulation) is implemented by the European Union. With this new legislation, the way we capture and handle CCTV footage will change to fit with the new guidelines presented by the European Union. With the implementation date closer than we think, businesses […]
IT security in focus at the Total Supply Chain Summit – Register today!

There are still some delegate and exhibitor places left for the Total Supply Chain Summit, which is taking place on November 13th & 14th at The Met Hotel, Leeds. For security professionals your complimentary VIP place includes pre-arranged meetings with trusted suppliers covering supply chain, logistics, distribution, warehousing, transport and more. These meetings are based on your […]
SecurityScorecard raises $27.5 million, pledges new solutions

SecurityScorecard has raised $27.5 million in Series C funding, led by Nokia Growth Partners (NGP) with participation from Moody’s Corporation, AXA Strategic Ventures, and Intel Capital. Existing investors Sequoia Capital, Google Ventures (GV), Boldstart Ventures, Two Sigma Ventures, and Evolution Equity Partners also participated. Funds from this investment round will be used to bring new […]
Attivo Networks raises $21m Series C round

Attivo Networks has raised $21 million in Series C venture capital funding, which was led by Trident Capital Cybersecurity with participation from existing investors Bain Capital Ventures and Omidyar Technology Ventures. The round of funding follows a $15 million Series B financing in May, representing $36 million raised in the last five months and a […]
Claim your VIP place at the Security IT Summit 2018

The next Security IT Summit takes place on July 3rd 2018 at the Hilton London Canary Wharf and will once again provide the leading platform for senior IT security professionals to meet with trusted solution providers, learn from the sector’s preeminent thought-leaders and network with peers. The 2017 instalment of the event was the most successful yet, with delegates able to […]
Oracle unveils automated database cyber defence solution

Oracle Executive Chairman and CTO Larry Ellison has unveiled new machine learning applications for database and cyber security in the opening keynote presentation at Oracle OpenWorld 2017 in San Francisco’s Moscone Center. Ellison introduced Oracle Autonomous Database Cloud, the world’s first 100 percent self-driving autonomous database, and new automated cyber defense applications that detect and […]
GUEST BLOG: From employee to security risk – How to protect your business

By Alex Viall, Director, Mustard IT As businesses become more aware of the threat of cyber-attacks, technical defences are becoming stronger. It’s far more difficult to hack into corporate networks than it used to be. Because of this, hackers are creating new methods of accessing secure data. These efforts are being directed at the new […]