Unisys unveils Stealth solution

New Unisys Stealth for Mobile solution protects against data breaches and other cybersecurity risks created by proliferation of consumer devices in the workplace.

Read More


Beta release of Red Hat Enterprise Linux 6 now available

To keep pace with the demand for enterprise-class infrastructure, the newest version of the leading Linux platform, the beta release of Red Hat Enterprise Linux 6.5, extends its scalability and manageability to aid in the build-out and control of large, complex IT environments. For example, Red Hat Enterprise Linux 6.5 will be designed to simplify the operation of mission-critical SAP applications by automating the optimal configuration of common SAP deployments.

Read More


Global study shows need for C-level leadership

Capgemini Consulting, in partnership with MIT Sloan Management Review, has announced the findings of a new global research survey into Digital Transformation – the opportunity for radical business change offered by the convergence of new digital technologies such as social media, mobile, analytics, and embedded devices. The study, “Embracing Digital Technology: A New Strategic Imperative,” reveals that while the potential opportunity of Digital Transformation is absolutely...

Read More

Becrypt continues innovation

Latest version of Advanced Port Control provides the only CAPS approved Port Control solution for high grade security levels.

Read More

According to The State of Cloud Security 2020, a global survey from next-generation cybersecurity...
Research reveals that companies investing in the latest cyber security products and services are...
Record-breaking 20 million active phishing Reporters and 100+ million phishing simulations inform...
Nearly three in four employees (72 percent) are willing to share sensitive, confidential or...
Trend Micro intercepted a surge in malware, phishing and credential theft.
Security Compass has published the results of a new report, “The State of Threat Modeling in...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more