Sophos adds email security

  • Published in

Acquisition of Reflexion Networks delivers effective and easy-to-use email security via the cloud.

Read More

BT secures cloud services integration offering with Check point software technologies

  • Published in

Embedded Cloud Firewall services to help customers move to cloud whilst minimising risk.

Read More

Keys and certificates 'chaos'

  • Published in

Venafi has released the results of its 2015 RSA Conference survey, gathered from nearly 850 IT security professionals during the week of April 20th in San Francisco. The survey data reve­als that most IT security professionals acknowledge they don’t know how to detect or remediate quickly from compromised cryptographic keys and digital certificates, the foundation of trust in our modern, digital world.

Read More

Integrated threat response and intelligence platform

  • Published in

Leveraging leading global threat intelligence to accelerate cybersecurity response and containment time.

Read More

Tenable Network Security extends capabilities of Nessus Agents

  • Published in

Additional coverage for Mac OS X and Linux helps Tenable customers further reduce the attack surface and strengthen system visibility on portable devices and other hard-to-scan assets.

Read More

Proofpoint extends targeted attack protection

  • Published in

Industry-leading advanced malware protection capabilities to secure users across LinkedIn, Facebook and Twitter.

Read More

ISACA’s COBIT 5 is included as an informative reference in the core of the US Cybersecurity...
A new report published by CREST looks for solutions to the increasing problems of stress and...
But staffing obstacles hamper SIEM implementations.
40% of firms expect an insider data breach in the next 12 months.
A new remote workforce study from CyberArk has found that the majority of UK employees feel more...
CyberArk has unveiled new just-in-time access capabilities that help reduce risk and improve...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more