How to Combat Monitoring & Security Tool Overload

How to Combat Monitoring & Security Tool Overload

Posted by Phil Trainor, Head of Security Business, APAC, Ixia, 15-08-2017

Are you managing your security and monitoring tools or are they managing you? We all want to say that WE are in control, right? Unfortunately, data from two recent Enterprise Management Associates (EM...

Mitigating Five IT Challenges Affecting the Healthcare Industry

Mitigating Five IT Challenges Affecting the Healthcare Industry

Posted by Naveen Bhat, Managing Director Asia Pacific for Ixia, a Keysight Business , 15-08-2017

The healthcare industry has been faced with a flood of challenges over the past several years. These challenges run the gambit of cost reduction, regulatory and legislative mandates, security attacks,...

Statistics show retailers need to improve data security

Statistics show retailers need to improve data security

Posted by SGCS Admin, 15-08-2017

Retailers need to invest more in cyber security with the number of retailers reporting data breaches to the Information Commissioner’s Office (ICO) having doubled in the past year, according to ...

State Department quietly establishes new cybersecurity office

State Department quietly establishes new cybersecurity office

Posted by SGCS Admin, 15-08-2017

The State Department quietly established a new office earlier this year within its Diplomatic Security Service to safeguard against and respond to cybersecurity threats. The State Department official...

British cyber researcher pleads not guilty to U.S. hacking charges

British cyber researcher pleads not guilty to U.S. hacking charges

Posted by SGCS Admin, 15-08-2017

SAN FRANCISCO (Reuters) - British cyber security researcher Marcus Hutchins pleaded not guilty on Monday to federal charges he built and sold malicious code used to steal banking credentials. Hutchin...

Network Performance Monitoring Tools Can Play A Critical Role In Responding to Security Breaches

Network Performance Monitoring Tools Can Play A Critical Role In Responding to Security Breaches

Posted by ExtraHop Networks, 14-08-2017

IT security is the single biggest challenge faced by organizations today, with threats like ransomware costing companies billions of dollars to detect and remediate. In order to address advanced threa...