Beach to breach – Reducing BYOD security risks during the summer holidays

By Sean Newman, Field Product Manager, Cisco.

Read More

PUM capabilities for ERPM

Lieberman Software Corporation is introducing new privileged user management (PUM) capabilities in Enterprise Random Password Manager™ (ERPM) at Microsoft TechEd 2014 in Houston, TX this week. The new PUM capabilities allow users to launch cross-platform applications in a secure environment, where elevated operations are automatically authorized, recorded and audited. ERPM now offers connectors for a broad array of cloud provider portals, SAAS vendors and social media platforms.

Read More

Pentura launches security e-Learning portal

Easy to follow staff education and training toolkit on data security issues.

Read More

DenyAll acquires BeeWare

DenyAll is executing on its growth strategy by acquiring BeeWare, another European security leader. With a broader portfolio and investment capability, the new DenyAll will deliver next generation application security to more customers worldwide, in the cloud and through its partner network.

Read More

Helping customers securely manage the ‘Internet of Things’

New agentless technology provides greater visibility across corporate networks and speeds discovery of all connected devices.

Read More

‘Cyber resilience’ is the new boardroom priority

Cyber Essentials implementation needs complementary standards, delegates are told.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
Attacks will broaden and differentiate to penetrate new vulnerable surfaces.
One in three UK employees (33%) used personal devices or cloud services to store employer data in...
Latest version of Advanced Port Control provides the only CAPS approved Port Control solution for...
Continued innovation and integration around security solutions provide customers with...
Zero trust technologies that enable seamless, secure user authentication are critical; 6 in 10...
Despite the NSA and Snowden controversy dominating news headlines and sparking a serious privacy...