Enterprise search adoption remains low

Despite the employee productivity benefits that internal enterprise search could bring to any organisation, a new survey reveals only 38% of IT departments responding have invested in or plan to invest in enterprise search capabilities for a range of reasons topped by security concerns. The survey, subject of a new report, included more than 300 enterprise IT security professionals and was conducted by Varonis Systems, Inc. (NASDAQ:VRNS), the leading provider of software solutions for...

Read More


Organisations blind to location of sensitive data

Informatica Corporation has announced the availability of a new independent research report by the Ponemon Institute LLC, entitled, The State of Data Centric Security. Based on a global survey of more than 1,500 IT and IT security professionals, the study reveals how organizations understand and respond to data security threats in today’s information-everywhere world.

Read More

Verizon unveils "Smart Credential" solutions for authenticating users to help stem data breaches

Data breaches continue to be in the news. In fact, according to the Verizon 2014 Data Breach Investigations Report, two-thirds of all breaches can be attributed to lost/stolen user credentials (user name/password). To help business better manage this risk by using a single credential in both the physical and virtual worlds, Verizon is offering a new service called "Smart Credential".

Read More


Next generation Threat Intelligence Services

Webroot has announced expansion of its enterprise-class security solutions with the introduction of BrightCloud® Security Services for Enterprise, a new portfolio of services which makes Webroot’s industry-leading threat intelligence available to enterprises through integration with popular network security and management platforms. The first services within this portfolio, BrightCloud for Next Generation Firewall (NGFW) and BrightCloud for Security Information and Event Management...

Read More

Proofpoint has published its annual Human Factor report findings, which detail that...
A consumer survey commissioned by the Open Data Institute (ODI), and published in advance of the...
Despite staggering interest, a top barrier to implementing Zero Trust strategies is, surprisingly,...
NordVPN issues seven cybersecurity resolutions for executives and employees to increase security in...
Thycotic, provider of privileged access management (PAM) solutions to more than 10,000...
Security Orchestration, Automation and Response (SOAR) will rocket to address cyber attacks...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more