Many IT failures caused by non-work related Internet use

Independent research commissioned by GFI Software shows that use of company devices for unrestricted personal use is leading to major downtime and loss of confidential data.

Read More

eSentire opens UK office in London, signals EMEA expansion

eSentire, Inc., a leader in Active Threat Protection solutions and managed security services, has opened an office in the United Kingdom, located in London at Liberty House, 222 Regent Street.

Read More


Telefónica Global Technology selects Fortinet

Telefónica Global Technology (TGT), Telefonica’s global information systems operation and management division, has selected Fortinet’s technology, over Check Point's, to help protect its consolidated data centre in Alcalá de Henares, Madrid.

Read More

No one is immune to breaches

Consumers experienced a wide range of data privacy and security threats in the third quarter of 2014 as hackers successfully conducted large-scale attacks against financial services and retail companies as well as consumers’ personal online accounts and identities. These were just some of the findings from the third quarter 2014 Breach Level Index (BLI) released today by SafeNet, Inc., a global leader in data protection solutions.

Read More


The path to policy righteousness demands the right processes, visibility and automation – but...
Company to deliver dynamic and static application security testing as integrated,...
On 10th anniversary of report, classic attack vectors re-emerge; Cisco reduces “Time to...
Arbor Networks Inc. has introduced Pravail Security Analytics for advanced threat detection,...
Sophos has introduced an advanced server protection product that combines whitelisting and...
Today marks the release of our fourth annual Businesses @ Work Report, which takes an in-depth...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more