Data-centric protection

Voltage Security has announced Voltage SecureData™ Suite for Test/Dev, a new solution providing maximum data protection with industry standards-accepted, next-generation Voltage Format-preserving Encryption™ (FPE) and Secure Stateless Tokenization™ (SST) technologies.

Read More


Steven Babb of Vodafone named International Vice President of ISACA

ISACA, a global association serving 115,000 information systems (IS) governance, assurance, risk and security professionals in 180 countries, has installed its 2014-2015 Board of Directors today. Steven Babb, CGEIT, CRISC, ITIL, Technology Risk, Compliance and Assurance leader at Vodafone (UK), was elected international vice president of the organization.

Read More

Cyber attacks reliant on privileged credential exploitation

CyberSheath analysis of 10 benchmark cyber-attacks from 2013 uncovers stolen privileged credentials form the basis of each attack.

Read More

Skyscape joins The Cloud Security Alliance (CSA)

Skyscape Cloud Services Limited has joined the Cloud Security Alliance (CSA), a not-for-profit organisation which aims to develop and promote best practice for providing security assurance within cloud computing, and to provide education on the uses of cloud computing to help secure all other forms of computing.

Read More


Fellows help Ponemon educate global organisations on improving data protection initiatives.
Deutsche Firmen und Einrichtungen rücken immer stärker in den Fokus von Hackern. Das...
According to research from Cisco, critical company data is at risk in the UK as a result of...
Simmons & Simmons hosts Avnet’s first FinancialPath™ University event in London.
Allied Telesis predicts that management, security and optimization of infrastructures will be the...
CA Technologies has introduced a new behavior analytics solution that integrates with CA...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more