Cavium introduces LiquidSecurity

Cavium has introduced the LiquidSecurity™ Hardware Security Module (HSM) Family, a complete Hardware Based Transaction Security Solution. The LiquidSecurity™ HSM family provides a FIPS 140-2 level 2 and 3 partitioned, centralized and elastic key management solution with the highest transaction/sec performance. It addresses the high performance security requirements for private key management and administration while also addressing elastic performance per virtual / network domain...

Read More

Black Hole Routing does not equate to DDoS protection

By Stephen Gates, Chief Security Evangelist for Corero Network Security.

Read More


Security Intelligence Platform for Sanctioned Cloud Services

Skyhigh Networks has introduced its Security Intelligence Platform for Sanctioned Cloud Services. The new offering is built on a canonical Cloud API Engine that enables rapid detection and response on a single platform for security, compliance, and data governance across all sanctioned cloud services such as Salesforce, Box, Microsoft Office 365, ServiceNow, Jive, Workday, Google for Work, and Dropbox for Business.

Read More

DevSecOps: Taking a DevOps approach to security

By James Brown, Director, Cloud Solutions Architecture.

Read More

itSoft extends its Security-as-a-Service offering

Leading Croatian cloud managed service provider develops new revenue streams with Clavister’s flexible, advanced security solution.

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more
Over one-third of all security incidents start with phishing emails or malicious attachments sent...
Encryption provider offers customers relief from IP Bill legislation with new jurisdictional...
2016 saw a record number of data breaches and this demonstrates that organisations, both large...
New IGEL innovation is critical amid the growing, costly cyberattacks that target endpoints.
New analysis finds that businesses with over 6,000 records face risk of economic loss without...
Threat intelligence will be the most crucial skill for next gen security professionals.