NEWS

Five key IT security trends for 2015

Ian Kilpatrick, chairman Wick Hill Group, specialists in secure IP infrastructure solutions, looks at five key IT security trends and solutions for 2015.

Read More

NEWS

Security fears stop firms using cloud computing services

New research from the Federation of Small Businesses (FSB) has found that despite three fifths (60%) of small firms questioned using cloud computing services, the remaining two fifths (38%) remain sceptical about the benefits of the technology in the face of perceived risks.

Read More

 Privileged Identity Management for Big Data

Centrify Corporation has launched what it says is the industry’s first privileged identity management solution for Apache Hadoop-based big data infrastructures, as well as partnerships with industry-leading big data vendors Cloudera, Hortonworks and MapR Technologies. 

Read More

Check Point acquires Hyperwise

Acquisition of stealth-mode start-up enhances threat prevention portfolio to stop attacks before they happen.

Read More

Wick Hill gains Cyber certification

Wick Hill has gained the recently launched Government Cyber Essentials certification. The Cyber Essentials Scheme is part of the UK Government’s National Cyber Security Strategy and provides an independent assessment of the essential security controls that organisations need to have in place to mitigate risks from internet-borne threats.

Read More

NEWS

Digital Guardian launches Digital Guardian 7.0 for data protection 'inside and out'

Digital Guardian has launched Digital Guardian 7.0, which extends the functionality of the patented Digital Guardian Agent to protect against advanced threats. The extension of Digital Guardian’s data protection capabilities comes with a redesign of the product architecture for ease of deployment for use cases ranging from data visibility and device control to indicator of compromise (IOC) detection and incident response.

Read More

What's keeping IT professionals awake at night? Data storage, data access and data sharing.
As C-level executives engage more frequently in incident response and threat hunting, more IT...
Three-quarters rely on traditional VPNs for remote access while a third also use zero trust as part...
HP’s commitment to data-centric security was demonstrated by its recent acquisition of...
FireEye, Inc. has announced the release of a new report, Supply Chain Analysis: From Quartermaster...
ThreatQuotient has released the State of Cyber Security Automation Adoption in 2021, new research...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more