More than two-thirds (67 per cent) of organisations admit that unauthorised cloud applications are being implemented without IT’s knowledge or involvement, and correspondingly pose a security risk to the business. This is according to a snapshot poll by Centrify, the leader in unified...
Read MoreAlienVault is partnering with Deutsche Telekom and T-Systems, the ICT division of Deutsche Telekom, to provide ‘German Mittelstand’ mid-market customers with the ability to detect and mitigate the impact of a breach.
Read MoreImation’s SDMA offers organizations and users a holistic approach to manage and protect an organization’s most valuable data from tampering, destruction, loss or leakage.
Read MoreBy Chris Stoneff, director of professional services at Lieberman Software Corporation.
Read MoreBTis integrating technology from Darktrace, one of the world’s fastest growing cyber threat...
Read MoreFinnish card payment system provider gains complete security visibility and combats banking malware.
Read MoreKaspersky Lab reveals latest cyberespionage tactics: complexity and modularity vs functionality.
Read MoreInnovative service provider deploys network-wide protection against a variety of sophisticated...
Read More‘IT Trends Report 2015: Business at the Speed of IT’ explores the current state of...
Read MoreBlue Coat Systems has entered into a definitive agreement to be acquired by funds advised by Bain...
Read MoreCheck Point has introduced Check Point Threat Extraction, a radical new security approach that...
Read MoreCapgemini to expand data and insights capabilities to meet growing market demands.
Read MoreCorero Network Security has enhanced its SmartWall® Threat Defence (TDS) System, now delivering...
Read MoreLeading pan-European energy trading house meets tight budgetary and regulatory constraints through...
Read MoreReal-time console details social media threats, risk trends and security effectiveness for...
Read More