A Brave New World - Dealing with security in AWS

By Russ Spitler, VP of Product Strategy for AlienVault. 

Read More

Cyber security confidence gap

C-level executives at Fortune 500 firms less confident in cyber security risk presentations for boards than IT professionals.

Read More

Check Point launches World Cyber Threat Map

Map highlights all attacks detected by Check Point gateways globally, showing the country of origin, target country and type of attack, with daily statistics.

Read More

Legacy solutions failing to prevent attacks

Bromium has revealed the results of its “State of Security Report Card,” a survey of more than 100 information security professionals at the RSA Conference in San Francisco. The survey results reveal that legacy solutions such as firewalls and antivirus are failing to prevent attacks and address the priorities set by their CISOs.

Read More


Fat lady sings as Dell transforms the Royal Opera House's IT infrastructure

Full end-to-end IT deployment from the desktop to the data centre.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
Lock & Key is a component of Imation’s recently announced Secure Data Movement...
Majority of respondents now view identity management as path forward.
Top business priority is improving efficiency.
Netwrix study dedicated to Sysadmin Day also finds that two thirds (66%) of system administrators...
Bit9 Security Platform v. 7.2, Carbon Black v. 4.2 and the new Threat Intelligence Cloud combine to...
By Steve Harcourt, Senior Information Security Consultant, Redstor.