CloudSigma adds policy-based security to its IaaS offering to provide faster, cheaper and more granular control over network security both on-premise and in the cloud
Read MoreBring Your Own Key using Thales technology is a security approach that Microsoft is now using to help manage and secure the digital rights of information and data delivered via the cloud by collaborating businesses
Read MoreTotal Defense says it has put some serious big data analytics steroids into its latest cloud-delivered security service, Total Defense for Business, with MSPs as much the target as direct end users
Read MoreBy combining its security admin and control tools with HighCloud’s encryption and key management HyTrust aims to give users the best chance of compliance
Read MoreLastine, a three year old security specialist with a longer history in identifying the dangerous unknown binary files and malicious websites, comes to the UK
Read MoreFujitsu CTO, Dr Joseph Reger, used a single, IP address-publishing lightbulb to extrapolate out the how the Internet of Things can be exploited, for good and ill
Read More