In the News

Lancope In The News

We invite you to read what independent sources are saying about our company and products.

2014  |  2013  |  2012  |  2011  |  2010  |  2009  |  2008  |  2007  |  2006  |  2005  |  2004  |  2003  | 
July 24, 2014 | SC Magazine UK

Entrepreneur develops hacked data search engine

July 23, 2014 | SC Magazine

Successful strategies for continuous response

July 22, 2014 | IT Security Guru

EFF calls for capabilities in building open wifi router

July 21, 2014 | CSO Online

Cybercrime: still only a tiny percentage of GDP, but it’s growing

July 17, 2014 | SC Magazine UK

Embedded Windows XP systems targeted by new Chinese malware

July 16, 2014 | Network World

Russian hackers breach CNET, steal one million usernames, passwords and email addresses

July 16, 2014 | WIRED

Successful Strategies for Continuous Response

July 15, 2014 | Computer Weekly

DevOops! I did it again

July 11, 2014 | SC Magazine UK

Game on for Gameover?

July 11, 2014 | IT Security Guru

New Trojan which uses GOZeus binary detected

July 11, 2014 | IT Business Edge

Congress Makes New Attempt at Cybersecurity Legislation

July 11, 2014 | International Business Times

Cyber-Criminals Revive Pernicious GameOver Zeus Malware

July 11, 2014 | v3.co.uk

Gameover Zeus botnet returns from the grave

July 09, 2014 | SC Magazine UK

Deep Panda - three years of attacks to defend China’s oil interests

July 08, 2014 | IT Security Guru

Estonia admits it detected a number of attempted attacks

July 07, 2014 | BBC News

Heathrow issues must-be-charged gadget advice

July 07, 2014 | IT Business Edge

Russian-Based Dragonfly Group Attacks Energy Industry

July 07, 2014 | Tech Page One

Who benefits from online privacy policies?

July 03, 2014 | Tech Page One

Why data backup isn’t as reliable as you think

July 03, 2014 | Information Security Buzz

Lancope Research on the State of Cyber Security

July 01, 2014 | SC Magazine UK

CryptoLocker returns after Operation Tovar

June 26, 2014 | Security Week

Montana Notifying 1.3 Million After State Health Agency Server Hacked

June 26, 2014 | SC Magazine UK

Get Safe Online publishes online safety hints, tips and videos

June 26, 2014 | CSO Online

Security awareness and concern are both on the rise among IT professionals

June 26, 2014 | info security

Insider Threats Top Infosecurity Europe Attendees’ Cyber Fears

June 25, 2014 | (IN)SECURE Magazine

Are you ready for the day when prevention fails? (Pages 61-64)

June 23, 2014 | info security

It’s a No for Yo as Messaging Service is Hit By Hackers

June 19, 2014 | Security Week

P.F. Chang’s Data Breach Could Go Back Months

June 19, 2014 | International Business Times

Gameover Zeus: Two Weeks On and Nothing Has Changed

June 16, 2014 | News Factor

Ransom Sought in Domino’s Pizza Data Breach Overseas

June 16, 2014 | Information Age

Domino’s pizza hack- the takeaway lessons

June 16, 2014 | Retail Technology

Hackers pressure Domino’s Pizza

June 12, 2014 | SC Magazine UK

Windows app privileges subverted

June 12, 2014 | The Guardian

Don’t be a World Cup loser online: give football cyber-scammers the boot

June 11, 2014 | Security Week

Cybercriminals Ramp Up Activity Ahead of 2014 World Cup

June 10, 2014 | International Business Times

Cybercriminals Will Leverage Chatbot Technology Used to ‘Pass’ Turing Test

June 06, 2014 | info security

Life For Hackers as UK Government Gets Tough on Computer Crime

June 06, 2014 | IT Security Guru

A year since Snowden’s revelations – industry views

June 06, 2014 | IT Security Guru

Rules of engagement

June 05, 2014 | ITProPortal

How to build a strong incident response team

June 05, 2014 | International Business Times

Edward Snowden: One Year On - History Will Decide if Whistleblower is Hero or Villain

June 05, 2014 | Sc

Apple iOS8: more open, but is it secure?

June 04, 2014 | SC Magazine UK

Anonymous takes aim at World Cup sponsors

June 04, 2014 | SC Magazine UK

XP still used by one in four PC users

May 29, 2014 | BT

Cyber attack on shoe company Office

May 29, 2014 | Information Age

Big security: big data and the end of SIEM

May 29, 2014 | SC Magazine UK

Repeat attacks hit two thirds of DDoS victims

May 29, 2014 | PC World

Latest eBay flaw is a rookie mistake for a website

May 26, 2014 | SYS-CON Media

Lancope’s StealthWatch Turns Enterprise Networks into Secure Sensor Grid

May 23, 2014 | SC Magazine UK

SNMP networks vulnerable to DDoS attacks, warns Akamai

May 23, 2014 | SC Magazine UK

Chinese state hackers revealed - victims fail to report breaches

May 23, 2014 | TechWorld

DDoS attacks using SNMP amplification on the rise

May 23, 2014 | Computer World UK

DDoS attacks using SNMP amplification on the rise

May 23, 2014 | PC Advisor

DDoS attacks using SNMP amplification on the rise

May 22, 2014 | BrightTALK

2 Minutes on BrightTALK: Considering the Attack Continuum

May 22, 2014 | BrightTALK

2 Minutes on BrightTALK: Unless you can see it, you can’t solve it

May 21, 2014 | BrightTALK

2 Minutes on BrightTALK: Protecting your Network

May 21, 2014 | IT Security Guru

China charged by US Government – industry views

May 21, 2014 | The Register

US giant NBC ‘leaks’ PRIVATE Amazon keys in Github Glenn gaffe

May 20, 2014 | IT Security Guru

US charges Chinese nationals with hacking

May 20, 2014 | Tech News World

US Toughens Stance on Chinese Cyberspying With 5 Criminal Indictments

May 19, 2014 | Network World

New products of the week 05.19.14

May 19, 2014 | SC Magazine UK

Fake AV apps spotted on Google Play, Windows Phone Store

May 16, 2014 | SC Magazine UK

US Senate reviews the security challenge of malvertising

May 16, 2014 | info security

Senate Calls for Tighter Controls to Halt Malvertising Epidemic

May 16, 2014 | IT Security Guru

European cops seek Blackshades users

May 15, 2014 | SC Magazine UK

Five-year-old Elderwood zero-day gang rides again

May 15, 2014 | CSO Online

Retailers team up to form new security alliance

May 15, 2014 | ITProPortal

If mother nature was a CISO: What the animal kingdom can teach us about IT security

May 14, 2014 | IT Security Guru

Why are default passwords unchanged – industry views

May 14, 2014 | IT Security Guru

Too good to be forgotten?

May 14, 2014 | Mail Online

The Edward Snowden guide to encryption

May 12, 2014 | International Business Times

Rogue Employees: The Biggest Threat to Information Security

May 12, 2014 | info security

Cybercrime Boss Offers Ferrari Prize for Most Lucrative Online Attack

May 12, 2014 | IT Business Edge

The 11 Essentials of Enterprise Security

May 09, 2014 | IT Security Guru

Corporate networks infected every day by botnets

May 09, 2014 | IT Security Guru

Many websites remain vulnerable to Heartbleed, a month after patch is released

May 09, 2014 | IT Security Guru

Anti-virus is dead, long live protection

May 08, 2014 | IT Security Guru

Rogue employees the biggest fear, but only half train staff

May 08, 2014 | SC Magazine UK

Enterprise IT systems widely compromised

May 08, 2014 | Forbes

10 (Stubbornly Pervasive) Windows XP Myths Debunked

May 07, 2014 | v3.co.uk

Security industry clashes over perks and pitfalls of antivirus tools

May 05, 2014 | CSO Online

Hackers capture dynamic data to prepare for effective, stealthy attacks

May 01, 2014 | International Business Times

Darknet & Bitcoin: The Perfect Storm for Cybercriminals

April 30, 2014 | IT Business Edge

How Heartbleed Is Changing Security

April 29, 2014 | Security Dark Reading

What Not To Do In a Cyberattack

April 28, 2014 | WIRED

HeartBleed Highlights Problems With Federal Computer Crime Laws

April 28, 2014 | Network World

Healthcare IT pros laud security, privacy tools

April 28, 2014 | Tech News World

Cybersquatters Prepare for Mischief

April 28, 2014 | DevOps.com

Embracing a culture of continuous incident response

April 24, 2014 | Network World

Fave Raves: 33 tech pros share their favorite IT products

April 24, 2014 | ITProPortal

Bank of England to simulate cyber war attacks in Operation Waking Shark 3

April 24, 2014 | SC Magazine UK

UK banks to get independent pen-testing?

April 23, 2014 | Information Age

Report reveals evolution of Point of Sale and Internet of Things attacks

April 23, 2014 | TechRepublic

Windows XP is a much greater risk than Heartbleed

April 23, 2014 | News Factor

What Verizon’s Data Breach Report Can Teach Enterprises

April 17, 2014 | IT Security Guru

HeartBleed highlights problems with Federal computer crime laws

April 17, 2014 | IT Security Guru

The positive side of Heartbleed

April 17, 2014 | PC World

Heartbleed: Security experts reality-check the 3 most hysterical fears

April 17, 2014 | SC Magazine UK

Heartbleed slows down the internet

April 16, 2014 | WIRED

Evolution as a Cybersecurity Strategy

April 14, 2014 | CNN Money

IRS: File your taxes now, ignore Heartbleed bug

April 10, 2014 | Computer World

Is Open Source to Blame for the Heartbleed Bug?

April 09, 2014 | Computer World

What you need to know about Heartbleed and OpenSSL

April 08, 2014 | Retail Technology

Retail IT experts warn on XP deadline

April 07, 2014 | Security Dark Reading

If Mother Nature Were A CISO

April 04, 2014 | PC World

XPocalypse Now: Security experts size up the cyberthreats

April 03, 2014 | SC Magazine UK

Smaller banks under fire from phishing attacks

March 24, 2014 | Network World

New products of the week 03.24.14

March 18, 2014 | CRN

Lancope Recruits Partners For Network Security Platform

March 18, 2014 | Security Dark Reading

Handling Targeted Attacks: Experts Speak

March 18, 2014 | info security

Man Arrested in Connection With Morrisons Payroll Breach

March 18, 2014 | Help Net Security

Gang wielding ColdFusion exploits expands botnet of hacked e-commerce sites

March 17, 2014 | info security

Amid Crimea Tension, Russian Hackers Hit NATO with Website Outage

March 14, 2014 | Computer Weekly

Morrisons data theft smacks of insider hacktivism, say security experts

March 14, 2014 | Retail Technology

Morrisons in payroll data breach

March 14, 2014 | IT Security Guru

Morrisons rocked by employee data theft

March 14, 2014 | CRN

Missed FireEye Alerts Reportedly Warned Of Security Lapse At Target

March 12, 2014 | SC Magazine UK

162,000 reasons to tighten up WordPress security

March 10, 2014 | Security Dark Reading

Defending Against Targeted Attacks Requires Human Touch, Speakers Say

March 09, 2014 | PC World

‘Perfect’ ransomware is the scariest threat to your PC

March 08, 2014 | The Guardian

Silk Road website did roaring trade in Tesco Clubcard vouchers

March 07, 2014 | Financial Times (UK)

Abortion provider fined over data loss

March 06, 2014 | IT Security Guru

BYOD could be solution to impending XP end

March 05, 2014 | SC Magazine UK

The final countdown for Windows XP

March 04, 2014 | Channel Line

Lancope announces new global partner program for network visibility and security solutions

March 03, 2014 | The VAR Guy

Lancope Announces New Global Partner Program

February 28, 2014 | Cyber Defense Magazine

The Rise of Incident Response

February 28, 2014 | SC Magazine

Organizations continue to lack incident response proficiency, study finds

February 21, 2014 | CSO Online

Energy sector a prime target for cyber attacks

February 18, 2014 | SC Magazine

Closing the cyber security threat intelligence gap

February 13, 2014 | eWeek

‘Cybersecurity Framework’ From NIST Outlines Security Risks

February 13, 2014 | TabbFORUM

Barclays Data Breach Sounds Alarm on Incident Response

February 13, 2014 | CRN

Investment In Data Breach Responders Lacking, Study Finds

February 12, 2014 | SC Magazine

A perfect time for cyber crime

February 12, 2014 | International Business Times

Mega DDoS Attacks of 800Gbps Within a Year

February 12, 2014 | SC Magazine UK

Phishing attacks soar by 20 percent

February 12, 2014 | info security

Largest Ever DDoS Attack Peaks at 400 Gbps

February 11, 2014 | IT Security Guru

The Mask infects users in more than 30 countries

February 10, 2014 | Computer Fraud & Security

Counting the cost of privacy

February 10, 2014 | SC Magazine UK

Report: Internet data poses risk to UK’s energy grid

February 10, 2014 | Tech News World

Defense Contractors Shore Up Security Post-Snowden

February 07, 2014 | Security Week

Lancope Enhances Visibility and Intelligence in StealthWatch System

February 07, 2014 | Security Dark Reading

Target Compromised Via Its HVAC Contractor’s Network Credentials

February 07, 2014 | Investor's Business Daily

Plugging Data Leaks Requires Whole-Company Commitment

February 06, 2014 | IT Business Edge

Will Congress Act on the Lack of Cybersecurity Practices in the U.S.?

February 04, 2014 | Security Week

Senate Cybersecurity Report Highlights Government Failures

February 04, 2014 | News Factor

Study Finds Basic Federal Cybersecurity Ignored

January 31, 2014 | CSO Online

NIST’s finalized cybersecurity framework receives mixed reviews

January 29, 2014 | CNBC Closing Bell

Lancope on CNBC Closing Bell

January 29, 2014 | SC Magazine UK

Lancope CTO sees ‘clear disconnect’ between board and security

January 28, 2014 | Government Security News

Cybercrime’s perfect storm

January 27, 2014 | Tech News World

Biz Brass Kept in Dark About Breaches

January 27, 2014 | SC Magazine

An extensive approach to security (Video)

January 24, 2014 | International Business Times

Businesses Ill-Equipped to Identify and Stop Cyber-Attacks

January 24, 2014 | Help Net Security

Fixing the Internet of Things

January 24, 2014 | Security Watch

(Security Watch) Amid Attacks, CEOs In The Dark About Cyber Security

January 24, 2014 | The Register

1.1 MILLION customers’ credit card data was swiped in Neiman Marcus breach

January 24, 2014 | Wall Street Journal

Survey Roundup: Unaware CEOs, Climate Risks to Supply Chains

January 23, 2014 | IT Business Edge

Time to Educate CEOs on Cybersecurity Issues

January 22, 2014 | SC Magazine UK

Cyber criminals tap the cloud for malware hosting

January 21, 2014 | Security Week

Security Incident Response Teams Getting Short End of Budget Stick

January 20, 2014 | Metro (UK)

A fridge full of spam: Hacked domestic appliances send a torrent of junk email

January 14, 2014 | info security

Neiman Marcus Reports Data Breach as Target’s Gets Bigger

January 13, 2014 | News Factor

Analysts: Retailers Must Be Vigilant After Hacks

January 06, 2014 | Security Dark Reading

Network Baseline Information Key To Detecting Anomalies

January 06, 2014 | IT Business Edge

New Year Rings in with Social Media Attacks

January 02, 2014 | PC Magazine

Predictions: Cyber-Security in 2014