E-Commerce and Retail

As we're nearing the end of 2014, Stephen Coty, chief security evangelist at Alert Logic, takes a retrospective look at some of the industries hardest hit by data breaches/vulnerabilities and looks to 2015 and beyond to discuss new and emerging malware.

Read More




Connected identity at the centre of everything

ForgeRock Inc. is updating its ForgeRock® Identity Platform, the first massively scalable, 100-percent commercial, open-source solution for Identity and Access Management (IAM), with new releases of OpenAM 12.0, OpenIDM 3.1 and OpenIG 3.1.

Read More

Mobility spurs major changes in enterprise governance strategies

Enterprise mobility and the proliferation of endpoints are driving profound changes in how organisations handle information governance, according to a Forrester Consulting survey commissioned by Druva. Companies are planning significant increases in governance-related spending, accelerated centralisation of governance programs, greater inclusion of endpoint content in eDiscoverydata collection initiatives, and others measures designed to address concerns over both the volume and the...

Read More

New report underscores the importance of layered security as zero day malware variants, JavaScript...
Strategic alliance combines advanced application delivery technologies with sophisticated threat...
Intralinks-commissioned survey reveals the majority of companies are not at all concerned about the...
Cyber London has started its second programme to support the brightest new European security...
Despite eight out of ten IT decision makers experiencing a data or cyber security breach in...
SafeNet, Inc has announced the extension of its ProtectFile solution to include the transparent and...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more