We could not find any results for:
Make sure your spelling is correct or try broadening your search.
Share Name | Share Symbol | Market | Type | Share ISIN | Share Description |
---|---|---|---|---|---|
Corero Network Security Plc | LSE:CNS | London | Ordinary Share | GB00B54X0432 | ORD 1P |
Price Change | % Change | Share Price | Bid Price | Offer Price | High Price | Low Price | Open Price | Shares Traded | Last Trade | |
---|---|---|---|---|---|---|---|---|---|---|
-0.25 | -2.04% | 12.00 | 11.50 | 12.50 | 12.25 | 12.00 | 12.25 | 626,022 | 12:09:18 |
Industry Sector | Turnover | Profit | EPS - Basic | PE Ratio | Market Cap |
---|---|---|---|---|---|
Computers & Software-whsl | 20.12M | 554k | 0.0011 | 109.09 | 61.06M |
Date | Subject | Author | Discuss |
---|---|---|---|
13/6/2015 11:21 | WHAT ARE DDOS ATTACKS For the most part, DDoS attacks are used to disrupt the online business by extorting money, disrupting normal operations, inciting anger among a company’s user base, or acting as a distraction while cybercriminals exploit a security loophole with the intent to steal data. A DDoS attack begins when an attacker uses a powerful computer or series of computers, such as those in a botnet (network of computers infected with malware designed to create such a network) or voluntary botnet (network of computers whose owners have volunteered them to become part of a botnet), to target a particular IP address with multiple simultaneous requests and other commands to the point that the server is no longer able to keep up with the requests. When this happens, the attacked server, such as a Web server or authentication server, will crash or be forced offline, bringing with it the company website and/or the services that its legitimate users and customers rely on. The immediate and long-term fallout of such attacks can cripple a business, and sometimes the organisation never fully recovers. DDoS attacks generally fall into one of two categories, an application layer attack or a network layer attack. Application layer attacks occur when cybercriminals target an organisation’s applications, including a website. These attacks disrupt by preventing customers and employees from accessing services. Network layer attacks attempt to overwhelm the networking equipment to prevent it from maintaining a connection. A third category of DDoS attack uses a combination of the two aforementioned techniques, earning it a hybrid attack designation. In these instances, criminals vary and alternate their attacks to achieve their goals. DDoS attacks can be highly disruptive to Internet connected organisations and attacks are costly in terms of data theft (breach), lost revenues, damaged brand or reputation and remediation costs. Furthermore, DDoS attacks have also been used as distractions to confuse or overload security protection equipment (such as firewalls) and staff, while data theft is undertaken. | affc21 | |
13/6/2015 10:56 | According to Infonetics Research; Corero is (or should be) in a sweet spot for the next few years, with the - DDos mitigation - security market forecast high growth of 66% up to 2018, by which time it is forecast to be a $1.5 billion market. The key trends expected to have a positive impact on the Corero market are: • Hosting and service providers (including cloud providers), and their customers increasingly being impacted by DDoS attacks and cyber threats. • On-line enterprises, of all sizes, are seeing an increase in DDoS attacks which adversely impact revenue generation, customer satisfaction and brand value, and such attacks are increasingly used as a smokescreen for other cyber threats. • Growth in cloud computing (which is forecast to increase over 300% in the period 2013 to 2020 to over $191 billion) and the trend of organisations outsourcing their IT infrastructure is increasing demand for service providers and hosting/cloud providers to deliver protection against DDoS and cyber threats. | affc21 | |
13/6/2015 10:20 | Corero Network Security Receives Multiple Awards: Corero Network Security Wins 2015 Cyber Defense Magazine Award Company’s SmartWall Threat Defense System Selected as Editor’s Choice in Data Center Security Solutions Category Hudson, MA - April 21, 2015 - Corero Network Security (LSE: CNS), a leading provider of First Line of Defense® security solutions against DDoS attacks, today announced that its SmartWall® Threat Defense System (TDS) was selected as the Editor’s Choice winner of the 2015 Cyber Defense Magazine awards in the Data Center Security Solutions category. With data center outages due to DDoS attacks averaging 86 minutes and costing approximately $8000 per minute, Corero’s SmartWall TDS is enabling these organizations to quickly respond to attacks, protect their customers and ensure maximum service availability. Customers around the world rely on the Corero SmartWall TDS to defend against the increasingly frequent and sophisticated DDoS attacks targeting their networks. Purpose-built to meet the needs of hosting providers, service providers and online enterprises, the SmartWall TDS network security appliances deliver real-time DDoS protection in rapidly-scalable deployments for higher performance, greater scalability and broader functionality than previously possible. Deployed at the network edge to mitigate a wide range of DDoS attacks, the SmartWall TDS enables customers to maintain full service connectivity while avoiding delays in the delivery of legitimate traffic. “Our DDoS Trends and Analysis report found that attackers are becoming more creative in their use of DDoS attacks to circumvent organizations’ security technologies – even using DDoS attacks to profile a victim’s network before launching more targeted attacks,” said Dave Larson, CTO and Vice President, Product, Corero Network Security. “With the SmartWall TDS in place, our customers can rest assured that they have a reliable first line of defense against the latest DDoS attacks, and this award from the editors of Cyber Defense Magazine affirms the value we deliver.” SmartWall TDS customers also have access to SecureWatch Analytics, a Web-based analytics portal or available via Splunk application, that delivers comprehensive, easy-to-read security dashboards based on DDoS-tailored security feeds from Corero’s First Line of Defense solutions. SecureWatch Analytics leverages Splunk software for big data analytics and advanced visualization capabilities, showing attacks in real-time and top attacks against an environment over any period of time. This provides sophisticated visibility into an attack, and other malicious attack traffic that is typically intended for data exfiltration purposes. Customers can also leverage SecureWatch Analytics’ historical reporting and behavior analysis features, as well as forensic capabilities to invest attacks against customer environments. Corero Network Security Receives Multiple Global Excellence Awards from Info Security Products Guide Company’s SmartWall Threat Defense System Recognized in “Innovation in Enterprise Security” and “Security Products and Solutions for Finance and Banking” Categories Hudson, MA – May 06, 2015 – Corero Network Security (LSE: CNS), a leading provider of First Line of Defense® security solutions against DDoS attacks, today announced that its SmartWall Threat Defense System (TDS) was selected for two 2015 Global Excellence Awards from Info Security Products Guide. As cyber criminals continue to evolve their use of DDoS attacks to infiltrate corporate networks, organizations are relying on Corero’s solutions to mitigate these attacks, maintain operations, and safeguard corporate and customer data from unauthorized access. | affc21 | |
13/6/2015 10:14 | 2015 has gone denial-of-service attack crazy Akamai is going on about the state of that internet again By Dave Neal Thu May 21 2015, 08:35 2015 IS RAPIDLY PROVING to be the year of the denial-of-service (DoS) attack, at least according to the latest State of the Internet report from Akamai. Akamai's regular report paints a detailed picture of the threat landscape. The view this year so far was blighted by the DoS attack to an even greater degree than during the previous quarter. The firm said that the number of such attacks increased by around a third during the period and by over 100 percent against the same period last year. The largest distributed DoS (DDoS) attack during the quarter peaked at 170Gbps. Attacks on Simple Service Discovery Protocol systems made up 20 percent of DoS attacks, mainly targeting Internet of Things devices. "The proliferation of unsecured home-based, internet-connected devices using the Universal Plug and Play protocol has made them attractive for use as reflectors," the report said. The firm added that the scale of its scans has increased, as has the amount of data that it produces. "By bringing in the web application attack data, along with in-depth reports from all of our security research teams, we're able to provide a more holistic view of the internet and the attacks that occur on a daily basis," said John Summers, vice president of Akamai's cloud security business unit. "This is our biggest and best security report yet. This report provides an in-depth look at DDoS attacks, and sets a baseline for web application attack triggers, so we will be able to report on attack trends for the network and application layers in our future reports." Akamai said that over 90 percent of the DoS traffic was aimed at infrastructure, and that gaming networks suffered in particular. The company found that a third of all attacks come from China, which may not surprise anyone reading this at GitHub. Web defacement practitioners did not stay idle during the quarter, and Akamai said that sites including WordPress and Joomla were targeted by these cyber vandals. SSL threats Poodle, Shellshock and Heartbleed also make an appearance in the catalogue of security woes. Akamai has recommend that people just straight out disable, or at least accelerate deprecation of, SSLv3 in order to deal with some of the problems here. Dave Larson, CTO at Corero Network Security, said that, while big attacks and threats get the attention, the lower level assaults can be just as damaging. "This correlates quite closely with the transition Corero has been noticing, where DDoS is being used more frequently as a masking agent or security perimeter degradation tool," he said. "The big attacks are still occurring, but the increase in lower level attacks of the type we have been highlighting would create this trend in the Akamai data. "Security conscious organisations must begin taking the threat of low-level DDoS seriously. DDoS is no longer principally about denying service. It is more about degrading security perimeters." µ | affc21 | |
10/6/2015 06:04 | Also posted on London South East forum, but no interest shown, so have posted on here. I have bought a small amount of CNS shares, with a view of increasing my shareholding here (dependant on research)... ------------------ Interesting find (for anyone that may be interested), Within the BLACKROCK SMALLER COMPANIES TRUST Portfolio Holdings, It states that: As at 31 March 2015 The Market Value of Corero Network Security is £91,075 within the fund. Now £91,075 = 809,555 shares at 11.25p share price (at 31 March 2015). That is less than 1% of the issued share capital of CNS. Blackrock were holding 4,262,067 shares (3.7%) as at 25 March 2015 (from the Annual Report and Accounts for the year ended 31 December 2014). I have not seen any “Holdings in Company” RNS stating that Blackrock have reduced their share holdings in CNS. But would not be surprised if their share holdings were reduced to zero shortly. Explains the large seller of late. Click on web links below for further information, Portfolio Holdings (click on link below): Alternatively, Click on “PORTFOLIO HOLDINGS” link, within the Blackrock smaller companies web page (below): | affc21 | |
08/6/2015 21:47 | nice little tick up there about time we had some news. | rolo7 | |
05/6/2015 09:14 | The latest data breach in USA might help CNS a little | raysor | |
05/6/2015 00:55 | Getting bored of this share some news would be good. Lots of conferences of late | rolo7 | |
15/4/2015 12:32 | VeriSign ($8bn mkt. cap.)commends Corero Networks by integrating their DDoS Cloud protection service with Corero's on-premises service. No financials and HB sticks with 24p target. Shares up 9% | raysor | |
10/4/2015 10:24 | Interesting to know what the two trades today are. If they are buys then it is encouraging that there are buyers around even though it is at the mid price. If they are sells then also encouraging that the shares seem reasonably liquid. Am I being too optimistic? | raysor | |
09/4/2015 15:41 | Tiny trades and then a delayed sale of 100k at 12p. Seems slightly strange to sell at that level? | raysor | |
09/4/2015 00:39 | Directors and employees have 8 million share options at 25p and above from reading the annual report. New sales director looks good. | rolo7 | |
08/4/2015 14:21 | Yesterday good contract win, board appointments and R&D facility in Edinburgh. Shareprice not going anywhere and you can pick them up near the middle. Finncap recently reiterated 24p TP but I am hoping they move up to 16p or so. | raysor | |
02/4/2015 18:37 | big volume again today. hxxp://www.coinbuzz. | rolo7 | |
31/3/2015 20:36 | Technology security is the hot investment topic of 2015. "Business demand for information security set to grow in 2015 Warwick Ashford Wednesday 11 March 2015 12:15 Businesses expect the pressure to secure their organisations to increase even further, according to the 2015 Security Pressures Report from security firm Trustwave. While 54% of IT and security professionals felt more pressure to secure their organisations in 2014, 57% of respondents expect to experience more pressure to secure their organisation in 2015. However, a greater proportion of enterprise respondents (64%) expect increased pressure, compared with the corresponding 48% of their small and medium business counterparts. Most respondents (84%) cited reputation or financial damage as their biggest fear of a breach at their organisation. “No matter the security maturity level at a given organisation, the pressure is on,” the report said. The report is based on a survey of more than 1,000 information security professionals. Respondents also reported pressure to roll out cloud and mobile IT projects, despite unresolved security issues. The security threat of emerging technology More than three-quarters of respondents said they had been pressured to unveil IT projects that were not security-ready. Nearly half of IT and security professionals were most pressured to use or deploy the cloud in 2014, up from 25% in 2013. The report notes that adopting emerging technologies – such as cloud and bring your own device (BYOD) – overtook advanced security threats as the top operational pressure facing respondents. Other challenges included understaffed security teams as security threats mount, and increasing pressure from C-level executives to protect data despite resource constraints. Some 61% of respondents said they felt the most pressure from owners, board and C-level executives – up from 50% in 2015. While 70% respondents believed they were safe from cyber attacks and data compromises, 84% wanted the size of their IT security team increased. Just over half said they would like to see their security team double in size, while just under a third said they would like to see it grow to at least four times its size. Low estimation of internal threats Asked about the nature of the threats, 62% of respondents were most pressured by external threats, compared with internal threats. Weak passwords were cited by just 9% of security professionals as the insider activity they felt most pressure to fend off, despite previous Trustwave research showing easy-to-crack passwords contributed to nearly a third of all breaches. In the light of increased demands, 78% of respondents said they are likely to, or plan to, collaborate with a managed security services provider (MSSP) in the future. “All signs point to turbulent times for IT and security professionals, and our findings back this up,” said John Amaral, senior vice-president of product management at Trustwave. “Overall, pressures for IT and security professionals increased from 2013 to 2014, and even more distress is expected in 2015,” he said. Threat landscape grows ever more hostile Amaral highlights that the survey found the decisions security professionals make are not necessarily the ones they want to make. “Many report they do not have enough resources and in-house skills to deploy a defence-in-depth security programme without confronting a mountain of pressure while doing it,” he said. Christina Richmond, programme director of security services at analyst firm IDC, said the pressures IT professionals face are growing. “Cyber criminals are increasingly crafty, new attack vectors are emerging, budgets are tight, skills are at a premium, security policies are either incomplete or disregarded, and many security solutions are proving too complex to manage or too basic to be useful against a professional adversary,” she said. Richmond said these pressures are driving businesses to increasingly look to partner with MSSPs who can help control complexities related to security technologies as well as mitigate and respond to advanced security threats. Seven recommendations for security professionals The report makes seven recommendations for information security professionals: 1. Accept that everyone, including you, is at risk: Operating under the belief that breaches are inevitable allows security professionals to better prepare their strategy; 2. Acknowledge that outsiders and insiders can equally hurt you: Attacks waged by outside adversaries attract the most headlines, but threats posed by insiders can be as destructive; 3. Turn to advanced solutions: Companies must turn to more advanced threat management solutions, such as next-generation SIEMs, file-integrity monitoring and anti-malware gateways; 4. Think security first: Automated vulnerability scanning, ongoing and in-depth penetration testing and web application firewall deployment can help keep reduce the risks; 5. Narrow the disconnect between the security group and senior management: Organisations that deploy strong IT governance, in which security-conscious leaders regularly communicate and collaborate with those responsible for security and ensure priorities are being met, are less likely to experience damaging breaches; 6. Embrace the revolution: Companies must recognise the exploding risk potential of disruptive and emerging technologies, assess them for vulnerabilities and deploy security controls such as network access control, data loss prevention and encryption; 7. Accept a helping hand: There is no shame in turning to an outside partner for help on threat, vulnerability and compliance management." As well as CNS, I like TGL, which owns high tech homeland security company GOS Systems. At 0.65p the market cap. is only £3.94M., and there has been big insider buying recently. GOS has been compared to GCHQ: Singray105 6 Nov'14 - 10:32 - 2029 of 4686 3 1 "Indeed chesy, well everything is a gamble of course but look at what we are getting for a Market Cap of a mere 1.5 miln GBP. Been showing GOS to some friends who understand this sort of stuff and they are saying WOW! Its like a private version of GCHQ." | hedgehog 100 | |
30/3/2015 23:10 | a few trades, hot sector to be in but company are NOT selling themselves let alone a profit any time soon a frustrating hold for me. Placing to raise money also needed by end of 2015 i guess. | rolo7 | |
02/3/2015 13:51 | Richard Koch recently bought a few more shares (around 13p?) | raysor | |
17/12/2014 15:41 | gap to fill up to 20p some great new investors here, USA pm share buys always a good clue! | rolo7 | |
08/10/2014 17:26 | anyone know who this guy is? Peter Kennedy Gain just brought 1.3m shares! | rolo7 | |
10/9/2014 07:45 | so glad I cashed my chips in sometime ago @ 50p for a big loss. Once again a company who manages to milk shareholders for constant cash calls whilst never ever meeting its targets. | cocker | |
18/6/2014 20:58 | Nice piece of news today largest contract yet hope it wasnt just for show as agm today anyone go? | rolo7 | |
04/6/2014 22:26 | Mach100, never mind the details, you're not incorrect. New holders (or those thinking about buying....) would benefit from looking at this thread from post one, as well as the Mondas thread before Mondas became Corero. rolo7 too. Apologies if I sound a tad cynical, but some research will show just why. | damanko | |
04/6/2014 18:22 | 50k buy order end of day filled someone in the know maybe? | rolo7 | |
03/6/2014 10:41 | added another 10k here, all on the news about internet security, hopefully right time right place for cns. | rolo7 |
It looks like you are not logged in. Click the button below to log in and keep track of your recent history.
Support: +44 (0) 203 8794 460 | support@advfn.com
By accessing the services available at ADVFN you are agreeing to be bound by ADVFN's Terms & Conditions