Top five biggest security predictions for the technology industry in 2016

  • Published in

Malware, Advanced Persistent Threats, and Linux ransomware are all set to plague businesses and consumers next year.

Read More

A 2015 top ten global hack attack list

  • Published in

If you’re an analyst who predicted that cyber attacks would go through the roof this year, 2015 has not been a disappointment. True to industry predictions, more security breaches through hacking have hit the headlines than ever before. Whether the target is a massive corporation or a small business, no organization is too big or too small to escape hackers’ scrutiny.

Read More

NEWS

Global survey reveals impact of data breaches on customer loyalty

  • Published in

Nearly two-thirds of consumers surveyed say they are unlikely to do business again with a company that had experienced a data breach where financial information was stolen.

Read More

Executives overly reliant on compliance metrics to measure security programme effectiveness

  • Published in

Seventy-nine percent of IT security professionals report to executive management on compliance, yet 59 percent say threat detection metrics are most critical.

Read More

PowerBroker for Sudo simplifies system management

  • Published in

Solution ideal for customers maintaining sudo for non-critical Unix or Linux servers.

Read More

OneLogin enhances its cloud-based IAM solution

  • Published in

As enterprises with large on-premise IT infrastructures migrate to the cloud,OneLogin’s new hybrid capabilities ensure that the legacy IT is not left behind.

Read More

Intralinks also gives customers sole control over data encryption keys, further strengthening...
Experienced enterprise and SaaS sales leader to lead the charge with Tufin’s...
Juniper Networks has announced Juniper Argon Secure, an advanced anti-malware service for Juniper...
LogRhythm has released its report, The State of the Security Team: Are Executives the Problem? The...
By Mike Hemes, Regional Director, Western Europe, A10 Networks.
Chris Marrison, consulting solutions architect at Infoblox, discusses the importance of checking...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more