NEWS

Cyber security has to be a C-Level priority

The importance of an integrated IT security strategy is steadily increasing, especially in current pandemic times.

Read More

NEWS

Remote operations lack remote access security

The Internet is the new enterprise corporate network as revealed in Zscaler’s State of digital transformation report 2020 EMEA.

Read More

NEWS

Thales launches Identity Verification Suite

Thales’s Gemalto Identity Verification Suite (IDV) minimizes ID fraud risks by verifying document authenticity so that service providers can digitally check identities of new customers.

Read More

NEWS

Zero trust momentum continues

Survey results released by Enterprise Management Associates and Pulse Secure reports that 60% of organisations have accelerated their Zero Trust projects during the pandemic, while only 15% have slowed down.

Read More

NEWS

BeyondTrust predicts the future

BeyondTrust experts forecast future threat vectors most likely to affect organizations worldwide in the New Year.

Read More

NEWS

Workers 'happy' to open suspicious emails

Mimecast has released new research which highlights the risky behavior of employees using company-issued devices.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
Along with broad-based use of encryption and biometric technologies, expect increased focus on...
iSheriff  and Soteria Intelligence have formed a joint partnership to integrate Soteria...
DXi6900 advances high-performance, scalable portfolio for modern data protection workflows.
Dell delivers new solutions to help customers simplify and enhance flexibility for both traditional...
DenyAll is executing on its growth strategy by acquiring BeeWare, another European security leader....
Imation’s SDMA offers organizations and users a holistic approach to manage and protect an...