Cloudy thinking: Why concerns about the cloud don’t translate into caution for most firms

  • Published in

By Christian Toon, Risk and Security Specialist at Iron Mountain.

Read More

AWS encryption

  • Published in

SafeNet, Inc. has announced key enhancements to SafeNet ProtectV that allow customers to encrypt Amazon EC2 workloads and maintain full ownership of encryption keys, with no need for on-premise hardware. SafeNet ProtectV with Virtual KeySecure is now available to run entirely on Amazon Web Services (AWS) infrastructure and is compatible with AWS CloudHSM, allowing customers to retain full ownership of their encryption keys while deploying entirely in the cloud. Through the AWS Marketplace,...

Read More

NED appointment signals intent to expand

  • Published in

LEADING business continuity and information security adviser Jermyn Consulting has signalled clear intent to push ahead with expansion plans by appointing one of the UK’s top Non-Executive Directors to its board.

Read More

Thales unveils Cyber Integration & Innovation Centre

  • Published in

Unique facility reinforces Thales’s commitment to improving UK’s cyber security.

Read More

Surge in SQL injection

  • Published in

Traditionally a technique of the most talented hackers, automated SQL attack tools are putting enterprises at greater risk of data breach.

Read More

Dell delivers connected security vision

  • Published in

Four new and updated solutions provide immediate value in protecting the organization, dramatically reducing business risk.

Read More

GhangorCloud, the company redefining information security compliance and protection against the...
Bit9 and Check Point® Software Technologies Ltd. has announced a partnership to integrate the...
Following in-depth analysis of the company’s latest Security Report, Check Point says a rise in...
Two-thirds of enterprises are s.truggling to embed security in the enterprise-IT architecture
According to new data from a global snapshot survey from SOTI Inc., more than 60 percent of...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more