Lancope launches ProxyWatch

  • Published in

New solution extends network visibility to both sides of a proxy conversation for advanced threat protection.

Read More

Cavium introduces LiquidSecurity

  • Published in

Cavium has introduced the LiquidSecurity™ Hardware Security Module (HSM) Family, a complete Hardware Based Transaction Security Solution. The LiquidSecurity™ HSM family provides a FIPS 140-2 level 2 and 3 partitioned, centralized and elastic key management solution with the highest transaction/sec performance. It addresses the high performance security requirements for private key management and administration while also addressing elastic performance per virtual / network domain...

Read More

Black Hole Routing does not equate to DDoS protection

  • Published in

By Stephen Gates, Chief Security Evangelist for Corero Network Security.

Read More


Security Intelligence Platform for Sanctioned Cloud Services

  • Published in

Skyhigh Networks has introduced its Security Intelligence Platform for Sanctioned Cloud Services. The new offering is built on a canonical Cloud API Engine that enables rapid detection and response on a single platform for security, compliance, and data governance across all sanctioned cloud services such as Salesforce, Box, Microsoft Office 365, ServiceNow, Jive, Workday, Google for Work, and Dropbox for Business.

Read More

DevSecOps: Taking a DevOps approach to security

  • Published in

By James Brown, Director, Cloud Solutions Architecture.

Read More

CA Technologies has signed a definitive agreement to acquire privately held Xceedium, Inc., a...
A leading crime lawyer predicts 2016 to be the year where organisations appoint dedicated cyber...
Centrify has been awarded the Skyhigh CloudTrust™ rating of Enterprise-Ready for its Centrify...
The Information Security Forum (ISF), the trusted source that senior security professionals and...
Acquisition will accelerate Okta’s journey to provide identity for the internet, bringing choice...
SolarWinds has announced the results of a survey- looking into the mobile security challenges faced...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more