Logo

Swivel Secure launches Swivel Cloud

  • Published in

Removes CAPEX investment needed to deploy multi-factor authentication; protects application gateways throughout enterprise cloud migration.

Read More

Tieto launches third internal start-up

  • Published in

Security Services to combat modern cyber security attacks.

Read More

NEWS

Endpoint security issues

  • Published in

Bromium has published “Endpoint Exploitation Trends 2015,” a Bromium Labs research report that analyses the ongoing security risk of popular websites and software.

Read More

NEWS

Compromised credentials a top concern

  • Published in

Length of investigations, limited resources, and lack of context put security professionals at a disadvantage when responding to security incidents.

Read More

Federated first?

  • Published in

Cloud-based security solution minimises an organisation’s attack surface by governing and securing federated access by outsourced IT, vendors and other third parties.

Read More

More endpoints mean more security

  • Published in

The two most transformative trends impacting IT service providers (ITSPs) are endpoint growth and demand for security services according to a new Autotask survey of more than 1,100 global ITSPs.

Read More

Research conducted by Varonis Systems found that over 50% of IT security professionals are not...
Point-to-Point Encryption reduces merchants’ vulnerability to a data breach or failed audit.
Nearly one-third (32%) of IT group employees in SMBs and mid-market enterprises globally said their...
Additional coverage for Mac OS X and Linux helps Tenable customers further reduce the attack...
WatchGuard® Technologies has revealed its full list of 10 new information security predictions...
At the moment we provide our personal details free to data-gathering giants like Facebook and...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more