Many IT failures caused by non-work related Internet use

Independent research commissioned by GFI Software shows that use of company devices for unrestricted personal use is leading to major downtime and loss of confidential data.

Read More

eSentire opens UK office in London, signals EMEA expansion

eSentire, Inc., a leader in Active Threat Protection solutions and managed security services, has opened an office in the United Kingdom, located in London at Liberty House, 222 Regent Street.

Read More


Telefónica Global Technology selects Fortinet

Telefónica Global Technology (TGT), Telefonica’s global information systems operation and management division, has selected Fortinet’s technology, over Check Point's, to help protect its consolidated data centre in Alcalá de Henares, Madrid.

Read More

No one is immune to breaches

Consumers experienced a wide range of data privacy and security threats in the third quarter of 2014 as hackers successfully conducted large-scale attacks against financial services and retail companies as well as consumers’ personal online accounts and identities. These were just some of the findings from the third quarter 2014 Breach Level Index (BLI) released today by SafeNet, Inc., a global leader in data protection solutions.

Read More


iSheriff  and Soteria Intelligence have formed a joint partnership to integrate Soteria...
Attackers using COVID-19 pandemic to launch attacks on vulnerable organisations.
Kroll Ontrack’s “decryption-on-the-fly” technology speeds up data recovery time...
Blue Coat Systems has entered into a definitive agreement to be acquired by funds advised by Bain...
Two in three organizations plan to deploy Artificial Intelligence to bolster their defense as soon...
The ISMG Cybersecurity Complexity Study sponsored by ReliaQuest suggests enterprises are adopting ...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more