What's in store for security?

Behavior-based authentication, state-sponsored cyber terrorism and IoT regulations top the list of the biggest possibilities for the coming year.

Read More

Durham County Council reduces data log analysis costs by 50%

Local authority expands use of SIEM technology internally to ensure compliance with all accreditation requirements across Durham and thwart data breaches.

Read More

Pulse Secure adds device discovery and profiling

Highly automated advanced detection and classification of managed and unmanaged devices secures BYOD and IoT growth.

Read More

Managed access for Geneva

Lieberman Software Corporation and Balabit have implemented their  joint solution at the Direction G?n?rale des Syst?mes d’Informations (DGSI), a division of the Security and Economics Department of the State of Geneva. The solution leverages the companies’ industry leading privileged user access and privileged identity management products. DGSI is one of Lieberman’s and Balabit’s joint clients - a result of their technology partnership since 2011, which was recently...

Read More

Check Point releases cyber-security predictions for 2017

Following in-depth analysis of the company’s latest Security Report, Check Point says a rise in connected and mobile devices will add to the complexity of IT security in 2017.

Read More

New research from data centre specialists ServerChoice shows remote working is leading to increased...
Despite 59% of cybersecurity professionals saying the widening workforce gap puts their...
McAfee has released its McAfee Threats Report: April 2021, examining cybercriminal activity related...
HuaNan Commercial Bank (HNCB) is very satisfied with the Keypasco authentication solution on...
Nearly seven out of ten attacks on all firms involved viruses, spyware or malware.
Security challenges can only be met with a steadfast commitment to improving cyber security...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more