Security orchestration

Tufin Orchestration Suite R15-2 reduces the attack surface and increases security controls across heterogeneous networks.

Read More


CA Technologies to acquire Xceedium

CA Technologies has signed a definitive agreement to acquire privately held Xceedium, Inc., a provider of privileged identity management solutions that protect on-premise, cloud and hybrid IT environments. Terms of the agreement were not disclosed. The transaction is expected to close within the quarter.

Read More

Alert Logic launches Cloud-native vulnerability and configuration management solution on Amazon Web Services

Alert Logic has introduced Alert Logic Cloud Insight, a cloud-native vulnerability and configuration management solution designed for customers running on Amazon Web Services (AWS). Alert Logic Cloud Insight integrates with AWS native security features to provide an integrated view of potential host and application level vulnerabilities for customers deploying on the AWS Cloud. Once identified, Alert Logic Cloud Insight takes the next step and provides proactive remediation actions that help...

Read More

Enhancing Cloud security

Leading SaaS security company deploys SecurityCenter Continuous View to attain the most comprehensive and accurate view of its international, multi-tenant cloud environment.

Read More

2021 ReliaQuest Security Technology Sprawl Report reveals rapid increase in security tools limiting...
The results of the 10th Annual Market Pulse Survey fromSailPoint Technologies Holdings expose an...
CNI organisations demonstrate strong appetite for digital transformation but misplaced confidence...
Security and risk management leaders must address eight top trends to enable rapid reinvention in...
Gemalto Breach Level Index highlights improperly secured databases in the cloud and internal...
Seventy-two percent believe nation-states have right to ‘hack back’ cybercriminals.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more