Dell Software offers best practices for increasing IT ROI with endpoint systems management

  • Published in

With a comprehensive, unified set of tools for managing all their systems, companies can improve operational efficiencies, elevate security and increase workforce productivity.

Read More

Data-centric protection

  • Published in

Voltage Security has announced Voltage SecureData™ Suite for Test/Dev, a new solution providing maximum data protection with industry standards-accepted, next-generation Voltage Format-preserving Encryption™ (FPE) and Secure Stateless Tokenization™ (SST) technologies.

Read More

Barry Davies to head up training and professional services at Wick Hill

  • Published in

Wick Hill creates new Professional Services Manager role to facilitate growth.

Read More

Steven Babb of Vodafone named International Vice President of ISACA

  • Published in

ISACA, a global association serving 115,000 information systems (IS) governance, assurance, risk and security professionals in 180 countries, has installed its 2014-2015 Board of Directors today. Steven Babb, CGEIT, CRISC, ITIL, Technology Risk, Compliance and Assurance leader at Vodafone (UK), was elected international vice president of the organization.

Read More

Cyber attacks reliant on privileged credential exploitation

  • Published in

CyberSheath analysis of 10 benchmark cyber-attacks from 2013 uncovers stolen privileged credentials form the basis of each attack.

Read More

Zero Trust Environment Infrastructures and the role of the CIO

  • Published in

By Dr. Wieland Alge, Vice President and General Manager EMEA Barracuda Networks.

Read More

Javvad Malik, Security Advocate at AlienVault, says results show a need for far greater support for...
90% of British businesses surveyed expect the number of cyber attacks to increase.
Identifies best practices for protecting sensitive data in the cloud with strong encryption and...
Sophos has published a new sectoral survey report, “The State of Ransomware in Manufacturing and...
On average two-in-five computers, related to the technological infrastructure of industrial...
Traditionally a technique of the most talented hackers, automated SQL attack tools are putting...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more