Tripwire introduces ‘Search by Hash’ functionality

Industry leading solution simplifies detection, verification and removal of malware at the endpoint.

Read More

Proofpoint joins Open Information Security Foundation

Leader in advanced threat protection remains dedicated to supporting open source initiatives following Emerging Threats acquisition.

Read More

Legal sector’s most sensitive data at risk from poor file sharing habits

Legal professionals are ignoring best practice by using insecure methods when sending and sharing sensitive information.

Read More

Tripwire appoints John Kelly Vice President of Worldwide Channel Sales

John Kelly has been named vice president of worldwide channel sales for Tripwire. In this role, Kelly will be responsible for expanding partnerships and deepening customer relationships within the channel.

Read More

More rigorous standards must be applied to the supply chain to ensure cyber security

Cyber Essentials should become de facto standard for doing business in the UK, says APMG.

Read More

CA Technologies strengthens identity-centric security portfolio

CA Technologies has launched new product releases in its identity-centric security portfolio that protect and enable the hybrid enterprise, from cloud, distributed and mobile to mainframe.

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more
Intel presents a software-defined, silicon-accelerated approach built on a foundation of openness,...
Commvault® Recovery Range™, powered by SimSpace, is the first to integrate realistic attack...
‘IT Trends Report 2015: Business at the Speed of IT’ explores the current state of...
Research into diameter reveals the underpinning protocol’s biggest threat to 4G users is denial...
BMC AMI Security continuously defends and hardens the mainframe against insider threats,...
HP Wolf Security report highlights the latest techniques and phishing lures targeting employees and...