Unisys unveils Stealth solution

  • Published in

New Unisys Stealth for Mobile solution protects against data breaches and other cybersecurity risks created by proliferation of consumer devices in the workplace.

Read More

Cyberthreats continue to go forth and multiply at financial institutions says Aite Group

  • Published in

Banks and merchants are struggling to keep pace with the threat environment, but collaboration is a way to get an edge.

Read More

Beta release of Red Hat Enterprise Linux 6 now available

To keep pace with the demand for enterprise-class infrastructure, the newest version of the leading Linux platform, the beta release of Red Hat Enterprise Linux 6.5, extends its scalability and manageability to aid in the build-out and control of large, complex IT environments. For example, Red Hat Enterprise Linux 6.5 will be designed to simplify the operation of mission-critical SAP applications by automating the optimal configuration of common SAP deployments.

Read More

WatchGuard Technologies brings Big Data visibility tools to network security

  • Published in

Zero-install, cloud-ready WatchGuard Dimension instantly distils ‘oceans of security data’ into key insights and trends.

Read More

Global study shows need for C-level leadership

Capgemini Consulting, in partnership with MIT Sloan Management Review, has announced the findings of a new global research survey into Digital Transformation – the opportunity for radical business change offered by the convergence of new digital technologies such as social media, mobile, analytics, and embedded devices. The study, “Embracing Digital Technology: A New Strategic Imperative,” reveals that while the potential opportunity of Digital Transformation is absolutely...

Read More

Becrypt continues innovation

  • Published in

Latest version of Advanced Port Control provides the only CAPS approved Port Control solution for high grade security levels.

Read More

McAfee has introduced significant enhancements to its Secure Access Service Edge (SASE) solution...
Rubrik to accelerate joint solutions and deliver cyber resiliency for customers with Microsoft...
Nearly 80 percent of cyber professionals say enterprises must understand behaviors and intent as...
Defenders fight back against weaponization of new technologies, industrialisation of e-crime, and...
C-level executives increasingly and proactively targeted by social breaches – correlating to a...
Cybercriminals leverage Microsoft Office exploits, fileless PowerShell threats, Locky...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more