Protecting the flow of sensitive data

ELSEN Group, a German logistics and personnel service provider, sought out a transparent solution with a single interface to help it manage file permissions and security groups. The company’s file shares had grown significantly over time, making it difficult to trace which employees were accessing data ­- and had permission to access what data - across its many departments.

Read More

Intel Security publishes five year threat report

Report provides five-year threat retrospective, GPU malware assessment, and techniques for exfiltrating data from corporate networks; ransomware rises 127% from Q2 2014 to Q2 2015.

Read More

AirGate accesses DDoS protection services

AirGate, provider of Secure Network Services to Canadian enterprises, has begun implementing the Corero SmartWall® Threat Defense System (TDS) to meet customer demands for real-time DDoS mitigation.

Read More


St. Elizabeth Healthcare improves IT security for connected medical devices

SecurityCenter Continuous View allows Northern Kentucky healthcare leader to preserve patient safety by detecting medical device vulnerabilities.

Read More

Cyber London, Europe’s first dedicated cyber security start-up accelerator and incubator, has...
Thycotic has released the findings from its 2018 Black Hat conducted survey of more than 300...
82% of corporations were attacked repeatedly; 57% suffered subsequent theft.
Phishing attacks are regarded as the greatest cyber threat.
Thycotic has expanded its PAM solution to address the risks associated with service account sprawl.
Cylance Inc. has introduced its virtual chief information security officer (vCISO) service, a...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more