Many IT failures caused by non-work related Internet use

Independent research commissioned by GFI Software shows that use of company devices for unrestricted personal use is leading to major downtime and loss of confidential data.

Read More

eSentire opens UK office in London, signals EMEA expansion

eSentire, Inc., a leader in Active Threat Protection solutions and managed security services, has opened an office in the United Kingdom, located in London at Liberty House, 222 Regent Street.

Read More


Telefónica Global Technology selects Fortinet

Telefónica Global Technology (TGT), Telefonica’s global information systems operation and management division, has selected Fortinet’s technology, over Check Point's, to help protect its consolidated data centre in Alcalá de Henares, Madrid.

Read More

No one is immune to breaches

Consumers experienced a wide range of data privacy and security threats in the third quarter of 2014 as hackers successfully conducted large-scale attacks against financial services and retail companies as well as consumers’ personal online accounts and identities. These were just some of the findings from the third quarter 2014 Breach Level Index (BLI) released today by SafeNet, Inc., a global leader in data protection solutions.

Read More


Security awareness training must be given more importance as likelihood of human error leading to a...
  With cyber attacks ranging from Yahoo! to the Democratic National Committee and the...
Risk-based authentication hinders threat actors while streamlining user experience.
As businesses increasingly embrace private, public, and hybrid clouds to cost-effectively and...
Ping Identity has released results from its 2019 Consumer Survey: Trust and Accountability in the...
According to SailPoint’s Annual Market Pulse Survey, cloud applications and mobile devices...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more