Happy Secure 2014

  • Published in

AppRiver's senior security analyst, Troy Gill, offers his top 10 list of security resolutions everyone should be making to stay stafe and out of a criminal's clutches next year:

Read More

WatchGuard's top 8 security predictions for 2014

  • Published in

Could a Hollywood hack come true? Will there be a U.S. Healthcare.gov data breach? Should you expect CryptoLocker clones?

Read More

The race to stem cybercrime using biometrics is on

  • Published in

Aite Group assesses nine emerging technology vendors that could bring biometric authentication into mainstream use.

Read More

Blue Coat acquires Norman Shark

  • Published in

Blue Coat Systems, Inc. has acquired Norman Shark, the global leader in malware analysis solutions for enterprises, service providers and government. The acquisition unites the industry’s most proven zero-day sandboxing technology with Blue Coat’s leading Advanced Threat Protection solution to help customers bridge the gap between identification of advanced persistent threats and resolution of those threats.

Read More

5 resolutions to prepare IT pros for 2014 trends

  • Published in

ISACA highlights Privacy 2.0, slimmed-down big data, heated-up cybersecurity and data analytics job market, outsourced security, and the Internet of even more Things.

Read More

CIOs seek to maintain relevance through service-led transformations

As IT spend moves to line of business managers, and with more than half spending at least 70% of their time on day-to-day tasks, CIOs are creating a new mission for IT.

Read More

Cisco has introduced new offerings to embed security throughout the extended network – from...
Lack of control of personal data most likely to drive consumers to another brand (54%), followed by...
Award-winning authentication provider appoints Bruce Jubb as Director for EMEA.
Alert Logic has published the results of a survey conducted with 400 UK cybersecurity...
Vendor Vulnerability study finds an increasing trust and dependence on third-party vendors with...
Worldwide spending on information security products and services will reach more than $114...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more