Widening gap between perimeter security perception and reality

  • Published in

While 87% of IT decision-makers feel their organisation’s perimeter security is effective at keeping out security threats, 30% of IT decision-makers admit their company has fallen victim to a data breach.

Read More

Akamai Cloud Security Intelligence is the foundation for new services

  • Published in

Recognising the crucial role data analytics play in more effectively fighting cloud security threats, Akamai Technologies has unveiled the foundation underpinning its award-winning Cloud Security Solutions. Known as Akamai Cloud Security Intelligence, a data processing engine within the Akamai Intelligent Platform, the engine is used to continuously analyse more than two Petabytes of data related to web security threats. Akamai uses the resulting intelligence to not only continuously update and...

Read More

AlienVault  launches Beta version of Open Threat Exchange 2.0

  • Published in

Company continues to see rapid growth for its unique crowd-sourced Open Threat Exchange with 26,000 participants and more than 1 million threat indicators daily.

Read More

Monitoring overall network health

  • Published in

Industry leader in continuous network monitoring introduces Assurance Report Cards in its flagship product to help customers align security policies with business objectives.

Read More

FireMon acquires mmediate Insight to expand security solutions portfolio

  • Published in

Acquisition delivers first-ever combination of proactive network security intelligence and real-time security event analysis.

Read More

Data security - top tips for senior managers

  • Published in

Ian Kilpatrick, chairman Wick Hill Group, explains why senior managers now need to be more involved in data security and offers his top tips.

Read More

Full end-to-end IT deployment from the desktop to the data centre.
Behavior-based authentication, state-sponsored cyber terrorism and IoT regulations top the list of...
Security awareness training must be given more importance as likelihood of human error leading to a...
Absolute Software releases the results of its Mobile Enterprise Risk research.
By Toyin Adelakun, a VP at Sestus.
ISACA research shows 1 in 5 enterprises experienced an APT attack; 1 in 3 of those don’t know...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more