Dell Software’s InTrust helps organisations securely collect, store, search and analyse data

New IT Search feature speeds security investigations and audits with single web interface, allowing IT to gain instant insight into user activity for security, compliance and operational visibility.

Read More

Sophos announces the future of comprehensive, simple-to-manage enduser protection

  • Published in

Sophos has announced new versions of key products that deliver on the company’s vision of Next-Generation Enduser Protection. Aimed at delivering unprecedented protection against malware and advanced threats, Next-Generation Enduser Protection includes the integration of Sophos’ innovative endpoint, mobile and encryption technologies.

Read More

Cohesive Networks introduces micro-perimeter security

  • Published in

Cohesive Networks has announced the availability of VNS3:turret. As the latest software offering in the VNS3 product family, VNS3:turret is a set encrypted, clustered software-only virtual instances that create a micro-perimeter around mission critical business systems.

Read More

NEWS

Lessons learned from 2014 – The year of the breach

  • Published in

Michael Aminzade, VP Global Compliance & Risk Services at Trustwave reflects on another year of breaches and discusses what organisations can do to help protect themselves from being attacked.

Read More

How to handle the security problem with big data

  • Published in

By Guillermo Lafuente, Security Consultant at MWR InfoSecurity.

Read More

Bromium appoints Robert Maus SVP of Business Development

  • Published in

Bromium®, Inc. has appointed Bob Maus as senior vice president, business development at Bromium. Maus brings more than 20 years of technology experience to Bromium, where he will be responsible for driving strategic alliances and technical partnerships to develop the Bromium ecosystem.

Read More

3rd Annual Global Password Security Report shows widespread password reuse, despite increased...
Bromium has published “Black Hat 2015: State of Security,” a survey of more than 100...
Businesses urged to protect themselves against cyber crime after new statistics show over four in...
The Global Enforcement Network (GPEN) and the Information Commissioner’s Office (ICO) have...
"Mama, I come to the valley of the rich Myself to sell" She said "Son, this is the...
Splunk has selected Ping Identity to provide its customers with simple and secure access to the...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more