If you want my data, reward me

At the moment we provide our personal details free to data-gathering giants like Facebook and Google, but that won’t always be the case, write Daniel de Bruin and Brad Thiele.

Read More

NetIQ CloudAccess 2.0 securely delivers improved single sign-on experience to SaaS applications

Offers singular IAM process and consistent user experience across enterprise, cloud and mobile devices.

Read More

Technology breakthrough cuts industry’s data recovery time on encrypted hard drives from days to hours

Kroll Ontrack’s “decryption-on-the-fly” technology speeds up data recovery time by taking a targeted approach to recovering encrypted hard drive data.

Read More

Thales and Ponemon Institute study shows increased use of encryption and further key management challenges

Thales announces the publication of its latest 2013 Global Encryption Trends Study. The report, based on independent research by the Ponemon Institute and sponsored by Thales, reveals that use of encryption continues to grow in response to consumer concerns, privacy compliance regulations and on-going cyber-attacks and yet there are still major challenges in executing data encryption policy.

Read More

Lock & Key is a component of Imation’s recently announced Secure Data Movement...
New Pulse Zero Trust Access (PZTA) service enhances productivity, simplifies management and...
2017 has been an interesting year for cyber security. With hacks still dominating the headlines...
McAfee Labs dubs 2014 “Year of shaken trust”; predicts 2015 trends in Internet trust...
Ericsson virtualisiert Netzwerk-Infrastruktur mit Carrier-Grade OpenStack Distribution von Mirantis
CyberSheath analysis of 10 benchmark cyber-attacks from 2013 uncovers stolen privileged credentials...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more