PCCW Global acquires Crypteia Networks

  • Published in

Companies can no longer go it alone on cyber security.

Read More

Silos cause security threat

  • Published in

IT team spending too long looking for, and addressing, threats.

Read More

Why Identity Management is the new perimeter

  • Published in

By Paul Moore, CTO, Centrify.

Read More

Third-party hosting and maintenance used to manage virtualization

  • Published in

Less than one-third of businesses keep their virtualisation servers on-premises and managed entirely by their own internal IT staff, according to a Kaspersky Lab survey of 3,900 IT professionals worldwide. As virtual infrastructure increasingly handles more business-critical services, the reliance on external hosting and management services raises potential security concerns, particularly for smaller businesses.

Read More

4.6 million employees lose employer data due to malfunctioning personal technology

  • Published in

One in three UK employees (33%) used personal devices or cloud services to store employer data in the last 12 months.

Read More

A10 Networks Security Alliance forms a platform to interconnect security solutions

  • Published in

A10 joins forces with leaders RSA, Arista, FireEye, FlowTraq, IBM Security, Ping Identity, Pulse Secure, Symantec, Vectra, Venafi, Webroot and more to help stem the rising tide of cyber security threats.

Read More

Point-to-Point Encryption reduces merchants’ vulnerability to a data breach or failed audit.
Extended range of gateways delivers award-winning automated threat prevention and integrated...
Passwords are a cornerstone method for securing access to data. However, a new survey...
LogMeIn has published results of a global study executed by IDG that reveals the new reality of...
Study shows organisations are managing more than ten times the amount of data than they did five...
By Boris Jabes, Senior Director of Product Management at LogMeIn.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more