Five reasons for including secure workspaces in BYOD deployments

Dell advocates the use of secure enterprise workspaces in BYOD environments to help organisations balance employee expectations, business goals, IT requirements and security needs. Today, a plethora of options exist for providing employees with the software and other enterprise resources needed to do their jobs. A secure workspace, however, is the most effective approach for accommodating employees’ needs for anywhere, anytime access to corporate data and resources while also elevating...

Read More

Use the new EU Data Protection reforms to secure funding for IT security, says Databarracks

The EU is to impose new data protection legislation to ensure better protection of the personal information of all EU citizens. The reforms will come with more severe fines for organisations that suffer data breaches. Peter Groucutt, managing director at Databarracks, claims that this is the tool IT professionals can use to drive-through security changes, as failure to do so will now result in severe repercussions: “Often, the fines imposed on organisations that suffer data breaches are...

Read More

Blue Coat reveals security risks from “One-Day Wonders” websites

Blue Coat Systems, Inc. says that 71 percent of hostnames appeared for just 24 hours. While the majority of these “One-Day Wonders” are the backbone for how Internet content is shared and delivered, the sheer volume provides cover for malicious activity, including communication to infected systems.

Read More

Finance sector vulnerable to insider threats as workers share passwords despite awareness of risks

A quarter of finance sector workers state they are frustrated with employer security policy, with one in ten admitting they actively attempt to circumvent it.

Read More

Tufin teams with VMware

Tufin® is working with VMware® to extend Tufin’s Security Policy Orchestration capabilities through the VMware NSX™ network virtualization platform to provide security managers with a unified security policy experience with central management and automation. Through these interoperable solutions, customers will gain granular visibility and visualization of network security in software-defined data centers (SDDCs). With this combination, network micro-segmentation can be...

Read More

Okta appoints Andrew Wittman to Chief Marketing Officer

Okta has announced the appointment of Andrew Wittman to chief marketing officer (CMO). As CMO, Wittman will oversee all aspects of the company’s marketing and communication strategy. The company also announced another period of spectacular growth and momentum during the first half of its 2015 fiscal year ending July 31. Milestones include 150 percent year-over-year revenue growth, surpassing 1,500 customers and recognition as a leader in Gartner’s first Magic Quadrant for...

Read More

HCL Technologies has opened its first European Cybersecurity Fusion Center (CSFC) in Gothenburg,...
Outgunned security executives navigate complex obstacles to keep rising attacks from turning into...
Check Point Research (CPR) report a 45% increase in cyber-attacks on healthcare organizations...
Acquisition advances Kaseya’s complete suite of integrated, best-in-class, cost-effective IT...
BlackBerry has released the 2021 BlackBerry Threat Report, detailing a sharp rise in cyberthreats...
Cybercriminals leverage Microsoft Office exploits, fileless PowerShell threats, Locky...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more