NEWS

Promoting CISO cybersecurity expertise

  • Published in

Panel of Global 1000 CISOs share advice for implementing strategic security programmes, gaining stakeholder support and measuring results.

Read More

NEWS

The ticking time bomb

  • Published in

40% of firms expect an insider data breach in the next 12 months.

Read More

NEWS

2016 - the year of cloud security?

  • Published in

2016 will be the year of cloud security and ROI, a year when CISOs finally get the recognition they deserve, and the year that Europe and the US make up or break up when it comes to data privacy. This is according to Yorgen Edholm, CEO & President of Accellion, an industry leader in providing secure, enterprise mobile file sharing and collaboration solutions.

Read More

NEWS

Governments come under cyberattack

  • Published in

The third quarter of 2015 has seen information and IT systems of different security agencies and governments compromised.

Read More

Proofpoint joins Open Information Security Foundation

  • Published in

Leader in advanced threat protection remains dedicated to supporting open source initiatives following Emerging Threats acquisition.

Read More

More rigorous standards must be applied to the supply chain to ensure cyber security

  • Published in

Cyber Essentials should become de facto standard for doing business in the UK, says APMG.

Read More

Alert Logic and Prelert have announced an OEM partnership enabling Prelert’s machine learning...
In response to customer demand for additional cloud enablement and risk mitigation capabilities,...
New whitepaper guides organisations to address ISO/IEC 27002 security controls with the CyberArk...
Atos, a global leader in digital transformation, believes waiting for digital threats to...
Staff are twice as likely to take risks on work devices than they are on personal ones.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more