Enterprise search adoption remains low

Despite the employee productivity benefits that internal enterprise search could bring to any organisation, a new survey reveals only 38% of IT departments responding have invested in or plan to invest in enterprise search capabilities for a range of reasons topped by security concerns. The survey, subject of a new report, included more than 300 enterprise IT security professionals and was conducted by Varonis Systems, Inc. (NASDAQ:VRNS), the leading provider of software solutions for...

Read More


Organisations blind to location of sensitive data

Informatica Corporation has announced the availability of a new independent research report by the Ponemon Institute LLC, entitled, The State of Data Centric Security. Based on a global survey of more than 1,500 IT and IT security professionals, the study reveals how organizations understand and respond to data security threats in today’s information-everywhere world.

Read More

Verizon unveils "Smart Credential" solutions for authenticating users to help stem data breaches

Data breaches continue to be in the news. In fact, according to the Verizon 2014 Data Breach Investigations Report, two-thirds of all breaches can be attributed to lost/stolen user credentials (user name/password). To help business better manage this risk by using a single credential in both the physical and virtual worlds, Verizon is offering a new service called "Smart Credential".

Read More

Next generation Threat Intelligence Services

Webroot has announced expansion of its enterprise-class security solutions with the introduction of BrightCloud® Security Services for Enterprise, a new portfolio of services which makes Webroot’s industry-leading threat intelligence available to enterprises through integration with popular network security and management platforms. The first services within this portfolio, BrightCloud for Next Generation Firewall (NGFW) and BrightCloud for Security Information and Event Management...

Read More

Lack of control of personal data most likely to drive consumers to another brand (54%), followed by...
A study conducted by MIT Technology Review finds that 96% of security leaders are now preparing for...
BeyondTrust's BeyondInsight 5.6 has extended the platform’s ability to provide a holistic...
Pioneering least privilege solution improves security by tamper-proofing critical binaries.
Blueliv, a leading enterprise-class cyberthreat intelligence company, has launched its 2018-2019...
Threat intelligence will be the most crucial skill for next gen security professionals.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more