Microsoft unveils state-of-the-art Cybercrime Center

  • Published in

Centre of excellence to help defend online safety worldwide.

Read More

FireEye report reveals possible malware “Cyber Arms Dealer”

  • Published in

FireEye, Inc. has announced the release of a new report, Supply Chain Analysis: From Quartermaster to Sunshop. The report details how many seemingly unrelated cyber attacks may, in fact, be part of a broader offensive fueled by a shared development and logistics infrastructure — a finding that suggests some targets are facing a more organized menace than they realize.

Read More

Acronis delivers enterprise-grade control and security for mobile file access and sharing in the Enterprise

  • Published in

Acronis® has released activEcho® 3.0 and mobilEcho® 5.0, providing enterprise-level management combined with consumer-grade simplicity for secure file access, synchronisation and sharing on mobile devices. These two products now include the Acronis Policy Engine, which provides granular management capabilities to create security policies and ensures control and compliance on all devices.

Read More

Trustwave acquisition bolsters data protection

  • Published in

Trustwave has announced the acquisition of data security provider Application Security, Inc. The company’s automated database security scanning technologies strengthen Trustwave’s ability to help organisations protect high-value data, reduce security risks and achieve compliance with mandates and regulations.

Read More

Stonesoft NGFW 5.6 update introduces API and enhanced virtualisation support

  • Published in

The cyber security expert Stonesoft, A McAfee Group Company, releases version 5.6 of its visionary Next Generation Firewall (NGFW). The release enables straightforward integration between the Stonesoft Security Management Center and 3rd party management systems as well as expands the virtual engine support to all available network security roles of Stonesoft NGFW.

Read More

Information security and risk management holding back UK business innovation

  • Published in

Concerns over security and risk stop project or business ideas progressing in nearly half of all organizations.

Read More

Poor password hygiene is also exposed as 54% of all employees reuse passwords across multiple work...
asks Keith Graham, CTO for SecureAuth.
Smaller than a mobile phone, tVolution Mini protects sensitive data and enables multi-agency...
Falcon OverWatch 2020 Mid-year report provides insights into massive uptick in intrusion activity...
Vera has emerged from stealth and unveiled its new data security solution built to give enterprises...
Passwordless solution provider invests heavily in Europe with new hires and new Frankfurt data...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more