IBM reveals five innovations that will ‘change our lives’

IBM has unveiled the eighth annual "IBM 5 in 5" – a list of innovations that have the potential to change the way people work, live and interact during the next five years.

Read More

Five enterprise IT predictions for 2014

Brought to you by David Gibson, VP at Varonis Systems - a provider of software solutions for unstructured, human-generated enterprise data.

Read More


EMEA Security Appliance market back to strong growth

According to IDC's Europe, Middle East and Africa Quarterly Security Appliance Tracker, 3Q12 factory revenue for the EMEA security appliance market reached $624.9 million, a 6.6% increase over the same quarter a year ago. Shipments declined by 1.8% year on year, with 171,158 units shipped. For 1Q–3Q 2013, security appliance market factory revenue totalled about $1.8 billion, representing a 4.2% increase over 1Q–3Q 2012.

Read More

Promising security evolution

By Tim 'TK' Keanini, CTO at Lancope.

Read More

Vormetric introduces Cloud Partner Programme

Vormetric has announced the Vormetric Cloud Partner programme. Created specifically to address the needs of service providers, the programme enables partners to easily incorporate Vormetric Data Security into their offerings enabling strong differentiation for existing services and the creation of new, higher margin, value-added solutions. Included in the programme are the Vormetric services, pricing and training for products that Cloud Service Providers, Hosting Providers, Managed Service...

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
Collaborations with ISARA Corporation and ID Quantique will make quantum-safe crypto more widely...
62% of UK survey respondents consider human error their organisation's biggest cyber vulnerability...
Finnish card payment system provider gains complete security visibility and combats banking malware.
Cybercriminals leverage Microsoft Office exploits, fileless PowerShell threats, Locky...
Keysight’s Threat Simulator delivers actionable recommendations for addressing vulnerabilities...
New survey finds insider threats are on the rise, despite organizations’ focus on defending...