DevOps ignoring security code quality

Research highlights the incongruous approach of code development and the business with regard to security.

Read More

BeyondTrust and SailPoint combine

The integration of BeyondInsight 6.0 and SailPoint IdentityIQ provides a single solution for addressing the challenges of privileged access management.

Read More

CyberArk secures enterprise cloud orchestration and automation

CyberArk delivers built-in privileged account security for cloud environments; automatically manages and secures privileged credentials for cloud orchestration and automation tools.

Read More

BeyondTrust introduces Partnership Program

New BeyondTrust Technology Alliance Program (BTAP) supports forward-thinking companies, cultivating technology integration for enhanced security and product development.

Read More

A10 Networks and Cylance join forces

A10 Networks and Cylance have formed a technology partnership designed to enhance cybersecurity for individual endpoints and users from the data centre to the cloud by incorporating cutting-edge advanced threat protection for encrypted traffic.

Read More

Gigamon fortifies security analytics with certificate metadata

Gigamon’s metadata generation engine enables faster detection of attacks that leverage falsified certificates.

Read More

Partnership drives proactive security approach inside global organisations, closes detection...
Bitdefender says that MSP partners can now leverage Bitdefender Managed Detection and Response...
Instant, automated, and fully contextualized vulnerability assessments enable organizations to...
Global testing and inspection service provider continues to build next generation industrial...
Quest Software has signed a definitive agreement with Clearlake Capital Group, L.P. (together with...
Creates the world’s only cybersecurity platform aligning the entire security lifecycle to the...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more