BMC and Qualys join forces to improve enterprise security

Integrated solution combines BMC BladeLogic and Qualys Vulnerability Management to quickly identify and remediate threats and boost collaboration between Security and IT Operations teams.

Read More

Security integrated into RTOS

Kaspersky Lab and SYSGO have showcased a security solution for safety-critical tasks which embeds the Kaspersky Security System within the real-time operating system PikeOS.

Read More

Fortinet FortiSandbox catches Zero-Day and Advanced Threats

Fortinet has launched FortiSandbox 2.0, delivering enhanced features to their top-rated FortiSandbox Advanced Threat Detection Appliances and FortiSandbox Cloud solutions with the power to discover and isolate more advanced threats from more places than ever before.

Read More

NEWS

Tenable unveils Nessus Cloud

Tenable launches Nessus Cloud to deliver world-class vulnerability management capabilities for SaaS applications in a hosted cloud-based service.

Read More

NEWS

McAfee Labs finds mobile apps left vulnerable for months

Intel Security has released its McAfee Labs Threats Report: February 2015, including assessments of the mobile threat landscape and the failure of mobile app developers to patch critical secure sockets layer (SSL) vulnerabilities, potentially impacting millions of mobile phone users. McAfee Labs also revealed details on the increasingly popular Angler exploit kit, and warned of increasingly aggressive potentially unwanted programs (PUPs) that change system settings and gather personal...

Read More


The proliferation of mobile devices is driving an array of positive changes in workplace culture...
New Research from Thycotic reveals IT security professionals feel they’re seen as the ‘doom...
Imperva Inc. has released its April Hacker Intelligence Initiative report, "The Non-Advanced...
Tenable has released the Measuring and Managing the Cyber Risks to Business Operations Report, an...
Lack of internal skills and access to better technology driving UK businesses to partner with...
Attackers chose reflection versus infection techniques to achieve larger DDoS attacks.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more