Beach to breach – Reducing BYOD security risks during the summer holidays

By Sean Newman, Field Product Manager, Cisco.

Read More

PUM capabilities for ERPM

Lieberman Software Corporation is introducing new privileged user management (PUM) capabilities in Enterprise Random Password Manager™ (ERPM) at Microsoft TechEd 2014 in Houston, TX this week. The new PUM capabilities allow users to launch cross-platform applications in a secure environment, where elevated operations are automatically authorized, recorded and audited. ERPM now offers connectors for a broad array of cloud provider portals, SAAS vendors and social media platforms.

Read More

Pentura launches security e-Learning portal

Easy to follow staff education and training toolkit on data security issues.

Read More

DenyAll acquires BeeWare

DenyAll is executing on its growth strategy by acquiring BeeWare, another European security leader. With a broader portfolio and investment capability, the new DenyAll will deliver next generation application security to more customers worldwide, in the cloud and through its partner network.

Read More

Helping customers securely manage the ‘Internet of Things’

New agentless technology provides greater visibility across corporate networks and speeds discovery of all connected devices.

Read More

‘Cyber resilience’ is the new boardroom priority

Cyber Essentials implementation needs complementary standards, delegates are told.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
Becrypt mShare addresses the growing demands and conflicts that data leakage prevention is placing...
Three decades of experience enhance Company’s service and product solutions.
Trustwave has released the 2014 Trustwave Global Security Report which reveals the top cybercrime,...
Third instalment of 2019 Security Report highlights the cloud and mobile attack vectors used to...
Funding bodies’ support for Centre for Secure Information Technologies (CSIT) at...
New research from the Federation of Small Businesses (FSB) has found that despite three fifths...