How Data Integration helps to combat cybercrime

By Julie Lockner, VP of ILM Product Marketing at Informatica.

Read More

STEALTHbits & CrossIdeas partner

STEALTHbits Technologies Inc., a leading supplier of Data Access Governance solutions for Unstructured Data and Microsoft Infrastructure Management solutions, has announced a new partnership with the Italian-based Identity & Access Governance solution provider CrossIdeas. The integration of STEALTHbits' Data Access Governance solutions with CrossIdeas' IDEAS Identity & Access Governance platform enables CrossIdeas customers to extend the benefits of user access lifecycle...

Read More

AppRiver offers email encryption

AppRiver is now leveraging the power of Switzerland’s secure cloud infrastructure to offer its email and Web security solutions to foreign businesses.

Read More

NTT Com Security strengthens Professional Services and UK management teams

Ongoing investment in senior appointments as company expands offensive security and managed security services offering.

Read More

Worldwide security software market grew 4.9 percent in 2013

Worldwide security software revenue totaled $19.9 billion in 2013, a 4.9 percent increase from 2012 revenue of $19.0 billion, according to Gartner, Inc. The lower-than-expected growth was due to commoditization of key subsegments and the decline in growth for two of the top five vendors.

Read More

Be security “centred” to fight attackers

By Sean Newman, Security Strategist for Sourcefire, now part of Cisco.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
Newly announced push authentication features and capabilities in the ForgeRock Identity Platform...
The C-Suite Report: The Current and Future State of Cybersecurity sponsored by Forcepoint reveals...
New report from SolarWinds MSP outlines a huge opportunity for service providers, with half of...
On average two-in-five computers, related to the technological infrastructure of industrial...
Partnership will provide joint customers with largest set of actionable threat intelligence in the...
Behavior-based authentication, state-sponsored cyber terrorism and IoT regulations top the list of...