WhiteHat Security introduces Acceleration Services

WhiteHat Security, the web security company, has introduced the rollout of its new WhiteHat Acceleration Services which are intended to help its customers advance their security programs through a variety of service offerings, such as remediation capabilities and services, and training engagements.

Read More

Lack of surprise over poor security

Research conducted by Varonis Systems found that over 50% of IT security professionals are not surprised that end users have access to more company data than they should have.

Read More

Cryptosoft launches data centric security platform V3.0 

New functionality, improved management capabilities and the introduction of gateway agent functionality set to revolutionise IoT data security.

Read More

AdaptiveMobile launches Threat Intelligence Unit (TIU)

Unique intelligence on latest mobile threats, including how SS7 network breaches are compromising personal and national security.

Read More

Code42 appoints Joe Payne as President and CEO

After more than 100 percent year-over-year growth, endpoint data security leader taps former Eloqua CEO to lead global operations.

Read More

DDoS attacks damage customer confidence and revenues

More than half of IT security professionals (52 percent) said loss of customer trust and confidence were the most damaging consequences of DDoS attacks for their businesses, according to new research from Corero Network Security.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
Industry demand for URL filtering grew 10 times since last year – slower progress compared to...
WatchGuard Technologies has announced the hiring of Andrew Young as vice president of product...
Identity and personal data theft account for 64% of all data breaches.
HyTrust Boundary Controls ensure tighter geographic restrictions to ease compliance, deter data...
A consumer survey commissioned by the Open Data Institute (ODI), and published in advance of the...
While attack vectors remain largely the same year over year, attack volume will increase and...