Security on the shelf

A report about wasteful spending.

Read More

Insiders pose the major threat

Vormetric has announced the results of its 2015 Insider Threat Report (ITR), conducted online on its behalf by Harris Poll and in conjunction with analyst firm Ovum in fall 2014 among 818 IT decision makers in various countries, including 408 in the United States. The report details striking findings around how U.S. and international enterprises perceive security threats, the types of employees considered most dangerous, environments at the greatest risk for data loss and the steps...

Read More

OPSWAT acquires email security provider Red Earth Software

OPSWAT acquires Red Earth Software, extending its advanced threat prevention technology to protect email and file transfer against malware and zero-day attacks.

Read More

Enterprise Immune system chosen for maritime insurance industry

DNK, a major insurance company for the shipping industry, has selected Darktrace’s Enterprise Immune System technology for cutting-edge cyber defense.

Read More

Tufin highlights three key challenges for data centre migration in 2015

Tufin®, the market-leading provider of Security Policy Orchestration solutions, is spearheading a drive to help companies understand and overcome the network and security challenges involved in migrating data centres. The company has outlined three key challenges to effective data centre migration faced by businesses - including application connectivity management, security and compliance - and how these can be overcome with the help of Tufin’s Orchestration Suite.

Read More

Azzurri adds to its cyber security credentials

Managed services provider achieves the Government’s new Cyber Essentials Plus accreditation.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
Okta, CrowdStrike, Netskope, and Proofpoint to deliver integrated product solutions, advanced...
Defence plans should be made around an asset based approach.
Acquisition of stealth-mode start-up enhances threat prevention portfolio to stop attacks before...
Trend Micro intercepted a surge in malware, phishing and credential theft.
Program enables reseller partners to capitalise on rapidly growing market demand for...
Vendor Vulnerability study finds an increasing trust and dependence on third-party vendors with...