Disjointed technologies as biggest challenge facing UK IT security pros

Lack of qualified staff named second biggest challenge with user access and vulnerability management among the top headaches for overworked security teams.

Read More

Hacks proliferate, while financial institutions bank on data protection to limit exposure in the cloud

CipherCloud has released its Q2 2015 Global Cloud Data Security Report. This quarter's report focuses on the strategies of over 50 global companies in banking, investment, wealth management and other areas of financial services used to protect sensitive data in the cloud. The takeaways provide real world tested guidance for other enterprises as they assess their options for protecting information against a potential data breach.

Read More

Blue Coat launches Endpoint Alliance Ecosystem

Blue Coat Systems has unveiled its Alliance Ecosystem of Endpoint Detection and Response (EDR) partners. Blue Coat developed this ecosystem to allow actionable intelligence gathered from endpoint security solutions to be shared with the entire Blue Coat security portfolio, enhancing customers’ ability to protect, detect and respond to incidents. Founding members of the Blue Coat Endpoint Alliance Ecosystem are Bit9 + Carbon Black, Countertack, Digital Guardian, Guidance Software,...

Read More




FireMon and Tripwire, Inc. have announced the integration of Tripwire IP360 and FireMon Security...
Cavium has introduced the LiquidSecurity™ Hardware Security Module (HSM) Family, a complete...
World-renowned computer scientist and Internet Hall of Fame inductee joins ThreatSTOP as Chief...
Study reveals regional disparities in adoption of cloud security: German businesses almost...
By Matt Alderman, VP of Strategy at Tenable Network Security.
SolarWinds has released the results of its New IT Survey-, which sheds light on the evolving role...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more