Many IT failures caused by non-work related Internet use

Independent research commissioned by GFI Software shows that use of company devices for unrestricted personal use is leading to major downtime and loss of confidential data.

Read More

eSentire opens UK office in London, signals EMEA expansion

eSentire, Inc., a leader in Active Threat Protection solutions and managed security services, has opened an office in the United Kingdom, located in London at Liberty House, 222 Regent Street.

Read More


Telefónica Global Technology selects Fortinet

Telefónica Global Technology (TGT), Telefonica’s global information systems operation and management division, has selected Fortinet’s technology, over Check Point's, to help protect its consolidated data centre in Alcalá de Henares, Madrid.

Read More

No one is immune to breaches

Consumers experienced a wide range of data privacy and security threats in the third quarter of 2014 as hackers successfully conducted large-scale attacks against financial services and retail companies as well as consumers’ personal online accounts and identities. These were just some of the findings from the third quarter 2014 Breach Level Index (BLI) released today by SafeNet, Inc., a global leader in data protection solutions.

Read More


Key management-as-a-service (KMaaS) meets enterprise needs for direct control of encryption keys.
New research highlights a growing reluctance to pay ransomware demands.
AlienVault has appointed Brian Robins as chief financial officer. Robins brings more than 20 years...
Huawei has unveiled its Advanced Persistent Threat (APT) Big Data Security Solution at Huawei...
Sophos has announced an extensive update to its award winning Unified Threat Management solution,...
Findings from a report released by Central European University's Center for Media, Data and...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more