Logo

Protecting against DDoS attacks – how well prepared are Data Centres?

  • Published in

By Dave Larson, CTO and VP Product at Corero Network Security.

Read More

Businesses face new security challenge from the Internet of Things

By Wieland Alge, VP & GM of EMEA at Barracuda Networks.

Read More

How data security dominated the data recovery conversation in 2014

  • Published in

Data security, business continuity and mobile devices were among the biggest trends impacting the data recovery industry in 2014, according to year-end information from leading provider Kroll Ontrack. The most talked about trend however was how data recovery companies could help corporations protect their data from theft.

Read More

New challenges and risk mitigation drive changes to IT security

  • Published in

Michael Fimin, CEO of Netwrix shares his list of top security trends for 2015.

Read More

ExtraHop predicts an IT security shakeup

ExtraHop has announced its top predictions for enterprise IT in 2015. Based on insight from customers, partners, and industry analysts and insiders, ExtraHop expects to see enterprises shift their focus from big suite vendors to new, best-of-breed solutions that scale to meet demand on performance, availability, and security.

Read More

E-Commerce and Retail

  • Published in

As we're nearing the end of 2014, Stephen Coty, chief security evangelist at Alert Logic, takes a retrospective look at some of the industries hardest hit by data breaches/vulnerabilities and looks to 2015 and beyond to discuss new and emerging malware.

Read More

Newly announced push authentication features and capabilities in the ForgeRock Identity Platform...
Vodafone has implemented CyberArk to protect and manage its privileged accounts, identities and...
Just 4% of IT departments have staff dedicated to analysing IT security logs and only 6% have...
CyberArk has introduced expanded privileged account security solutions for Amazon Web Services...
Skyhigh Networks has released the next edition of its quarterly Cloud Adoption and Risk Report. ...
Identity 3.0 solution will keep digital users’ personal details secure and solve IT security...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more