Logo

Many IT failures caused by non-work related Internet use

  • Published in

Independent research commissioned by GFI Software shows that use of company devices for unrestricted personal use is leading to major downtime and loss of confidential data.

Read More

eSentire opens UK office in London, signals EMEA expansion

  • Published in

eSentire, Inc., a leader in Active Threat Protection solutions and managed security services, has opened an office in the United Kingdom, located in London at Liberty House, 222 Regent Street.

Read More

Agari and Palo Alto agree to threat intelligence data exchange

  • Published in

Agari has entered into an agreement with Palo Alto Networks, the leader in enterprise security.

Read More

Telefónica Global Technology selects Fortinet

  • Published in

Telefónica Global Technology (TGT), Telefonica’s global information systems operation and management division, has selected Fortinet’s technology, over Check Point's, to help protect its consolidated data centre in Alcalá de Henares, Madrid.

Read More

No one is immune to breaches

  • Published in

Consumers experienced a wide range of data privacy and security threats in the third quarter of 2014 as hackers successfully conducted large-scale attacks against financial services and retail companies as well as consumers’ personal online accounts and identities. These were just some of the findings from the third quarter 2014 Breach Level Index (BLI) released today by SafeNet, Inc., a global leader in data protection solutions.

Read More

Top five tips for security behaviour management programs

  • Published in

By Scott Greaux, Vice President, Products and Services, PhishMe.

Read More

Getronics Mid-Market Reality Check report reveals IT investment priorities for year ahead.
Bitglass has released its 2021 Remote Workforce Security Report. Bitglass surveyed IT and security...
Trend Micro Zero Trust Risk Insights reveals and prioritizes risks for better decision making.
BeyondTrust has introduced the new Privilege Management SaaS, supporting Windows desktops/servers...
Lack of encryption and weak or shared passwords expose sensitive corporate and customer information.
Understanding the scale and magnitude of the use of unauthorised applications across the enterprise...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more