Arxan Technologies announces Regional Sales Director for Central Europe

  • Published in

Arxan expands international presence in response to growing demand for protecting applications in mobile and connected environments.

Read More


BYOD causes security headaches

  • Published in

Security and privacy concerns plague 77% of IT leadership when building and implementing mobility strategies.

Read More

Becrypt DISK Protect gains CESG Commercial Product Assurance (CPA) Augmented Grade certification

  • Published in

Becrypt says that its DISK Protect data encryption solution has successfully completed a CESG Commercial Product Assurance (CPA) evaluation at Augmented Grade.

Read More

IP EXPO 2014 adds two co-located events

Data Centre Expo and Enterprise Security Expo round out Europe’s number one end-to-end enterprise IT event.

Read More

Top predictions for IT organizations and users for 2014 and beyond

Gartner, Inc. has revealed its top predictions for IT organizations and IT users for 2014 and beyond. Gartner's top predictions for 2014 combine several disruptive topics — Digital Industrial Revolution, Digital Business, Smart Machines and the Internet of Things — that are set to have an impact well beyond just the IT function.

Read More

As cloud computing re-charts the path of enterprise IT, organisations are vastly underestimating...
Former vice president of Avaya's worldwide partner organisation to bring proactive security to...
Threat intelligence will be the most crucial skill for next gen security professionals.
Password-related challenges continue in remote work environment; Passwordless Authentication proves...
The Cyber Streetwise Forum says that proactivity in tackling cyber crime must be a key business...
Majority of AlgoSec survey respondents feel that business stakeholders need to “own the...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more