Check Point introduces CPU-level threat prevention solution  

  • Published in

Check Point SandBlast™ introduces CPU-level sandboxing for threat detection and extraction.

Read More

Protecting the flow of sensitive data

  • Published in

ELSEN Group, a German logistics and personnel service provider, sought out a transparent solution with a single interface to help it manage file permissions and security groups. The company’s file shares had grown significantly over time, making it difficult to trace which employees were accessing data ­- and had permission to access what data - across its many departments.

Read More

Intel Security publishes five year threat report

  • Published in

Report provides five-year threat retrospective, GPU malware assessment, and techniques for exfiltrating data from corporate networks; ransomware rises 127% from Q2 2014 to Q2 2015.

Read More

AirGate accesses DDoS protection services

  • Published in

AirGate, provider of Secure Network Services to Canadian enterprises, has begun implementing the Corero SmartWall® Threat Defense System (TDS) to meet customer demands for real-time DDoS mitigation.

Read More

Gigamon teams with RSA  

  • Published in

Gigamon and RSA bring best of breed visibility to Software-Defined Data Centres.

Read More

St. Elizabeth Healthcare improves IT security for connected medical devices

  • Published in

SecurityCenter Continuous View allows Northern Kentucky healthcare leader to preserve patient safety by detecting medical device vulnerabilities.

Read More

Adds support for Android for Work, Chromebooks and secure remote access to Google Compute Engine...
Okta research shows workers are ready to go passwordless this year.
Palo Alto Networks has released findings of independent research into the state of cybersecurity...
Covid-19 pandemic sparks soaring demand for robust digital identity schemes globally.
Venafi and Cyber Security Research Institute uncover flourishing trade in code signing...
Proofpoint has published its annual Human Factor report findings, which details how cyberattackers...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more