mike hamilton.jpg

Ziften expands Board of Directors with appointment of California investment executive and entrepreneur Dave Lin

Investment executives/entrepreneurs Patrick O’Reilly and Jonathan Hung join Ziften as Board Observers more
Vera Jourova CE.jpg

International data flows: The European Commission launches the adoption of its adequacy decision on Japan

Following the conclusion of the EU-Japan talks on personal data protection in July 2018, the Commission yesterday launched the procedure for the adoption of its adequacy decision. The EU and Japan affirm that, in the digital era, promoting high privacy and personal data protection standards and facilitating international trade must and can go hand in hand

Vera Joureva Japón CE.jpg

The European Union and Japan agreed to create the world's largest area of safe data flows

The EU and Japan successfully concluded their talks on reciprocal adequacy. They agreed to recognise each other's data protection systems as 'equivalent', which will allow data to flow safely between the EU and Japan
more news


Mike Hamilton Ziften.jpg

Ziften adds advanced AV to the Zenith endpoint protection platform to stop cyber-attacks before damage or loss can occur

Advanced anti-virus (AV) capability detects multiple attack vectors to prevent file-based, fileless, and in-memory attacks with the power of artificial intelligence (AI) and the cloud

Wedge Networks Zhang.JPG

Wedge Networks increases functionality and performance of industry leading malware prevention platform

Release 2.0 of the Wedge Advanced Malware Blocker introduces support for Avira anti-malware technology and scanning of internal traffic to maximize threat prevention

Josh Harriman Ziften.jpg

Ziften joins Microsoft Community in contributing to Windows Defender ATP advanced hunting project – Targeting growth in fileless

Ziften contributes macOS and Linux visibility, behavioral analytics, and threat hunting queries speeding the identification and tracking of suspicious behaviors and risks more
more products


Japan MWC 2013.JPG

Questions & answers on the Japan adequacy decision

What is an adequacy decision? An adequacy decision is a decision taken by the European Commission establishing that a third country provides a comparable level of protection of personal data to that in the European Union, through its domestic law or its international commitments
Cybersecurity Europe.JPG

Directive on Security of Network and Information systems, the first EU-wide legislation on cybersecurity

9 May was the deadline for the Member States to transpose into national laws the Directive on Security of Network and Information Systems (NIS Directive) that entered into force in August 2016. The NIS Directive is the first EU-wide legislation on cybersecurity

Brian Lord OBE.JPG

The Mind of the Hacker - Insights from GCHQ, MI6 and Israeli Intelligence

It used to be the trickery of the disinterested joker – bright youngsters pulling the data strings just to see what would happen. Then came criminals, adapting old con-trickery and thieving skills to the new cyber environment. Then it escalated to international gangs and now we are faced with political interest and rival shaping a post-truth world. Where are we heading? What is already happening? Vital questions must be addressed in this opening session before we turn to the technologies, solutions and strategies for securing the Cloud and Internet of Things. Brian Lord, OBE – former GCHQ Deputy Director for Intelligence and Cyber Operations – begins by describing the big picture, how it is evolving and where we could be heading. How is the balance of knowledge and power changing? And how will this affect our industry, business and society?

more interviews


Michela Menting Abi Research.png

Cyberthreats to the utility infrastructure very grave according to new report

The US$8 billion spend to secure smart utilities inadequate; Cyberthreats to the utility infrastructure grave more
Slavik Markovich Demisto.JPG

Robots to the rescue! How AI and Machine Learning are empowering today’s security operations analysts

These are the droids you’re looking for: Tireless, uncomplaining, able to work 24 hours every day, responding instantly to threats against the Empire… or rather, threats against an enterprise, service provider, or telco

Greg Fitzgerald.JPG

Reinventing the SOC: Solutions for improving security and curing the alert-fatigue epidemic

Call it alert fatigue. Call it information overload. Call it mind-killing and soul-destroying. The sheer number of alerts coming into a modern security operations center (SOC) can overwhelm even the most dedicated security analysts

more articles