Happy Secure 2014

AppRiver's senior security analyst, Troy Gill, offers his top 10 list of security resolutions everyone should be making to stay stafe and out of a criminal's clutches next year:

Read More

WatchGuard's top 8 security predictions for 2014

Could a Hollywood hack come true? Will there be a U.S. Healthcare.gov data breach? Should you expect CryptoLocker clones?

Read More

The race to stem cybercrime using biometrics is on

Aite Group assesses nine emerging technology vendors that could bring biometric authentication into mainstream use.

Read More

Blue Coat acquires Norman Shark

Blue Coat Systems, Inc. has acquired Norman Shark, the global leader in malware analysis solutions for enterprises, service providers and government. The acquisition unites the industry’s most proven zero-day sandboxing technology with Blue Coat’s leading Advanced Threat Protection solution to help customers bridge the gap between identification of advanced persistent threats and resolution of those threats.

Read More

5 resolutions to prepare IT pros for 2014 trends

ISACA highlights Privacy 2.0, slimmed-down big data, heated-up cybersecurity and data analytics job market, outsourced security, and the Internet of even more Things.

Read More

CIOs seek to maintain relevance through service-led transformations

As IT spend moves to line of business managers, and with more than half spending at least 70% of their time on day-to-day tasks, CIOs are creating a new mission for IT.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
Bromium and NTT Com Security have formed a strategic global partnership to deliver Bromium’s...
Tufin® is working with VMware® to extend Tufin’s Security Policy Orchestration...
One in four healthcare organisation was fined for non-compliance and 1 in 10 was sued as a result...
Malware attacks abusing machine identities grew eightfold over the last 10 years.
By Steve Harcourt, Senior Information Security Consultant, Redstor.
A10 Networks has introduced A10 FlexPool, a software subscription model that provides enterprises...