Cognia expands global cloud compliance presence with Australia launch

Strategic partnership with IP Solutions International takes cloud PCI compliant payment processing to new levels.

Read More


Lack of controls to manage privileged access

Fragmented priorities, total cost of ownership seen as inhibitors of enterprise adoption.

Read More

A toast to GIN

Blue Coat Systems says that its cloud-based Global Intelligence Network now integrates Blue Coat’s entire portfolio, including the Norman Shark sandboxing technology and Solera Networks forensics and incident response products recently acquired by Blue Coat. All products now feed and receive threat information on a continuous basis, providing security professionals real-time intelligence that allows them to more effectively blocks threats. This leads to reduced attacks and a more...

Read More

DDoS attacks 'more frequent and sophisticated in nature'

Corero Network Security has released the findings of its inaugural Quarterly DDoS Trends and Analysis Report. Through the analysis of customer data from the fourth quarter of 2014, Corero found that attackers are evolving their use of DDoS attacks to circumvent companies’ cybersecurity solutions, disrupt service availability and infiltrate victim networks.

Read More

Only 41% of privileged accounts are assigned to permanent employees of the business with the...
Just under 70% also say they are preparing for an inevitable data breach.
Provides a 360-degree visibility into the threat landscape and protects from malware & ransomware...
HP Wolf Security Study highlights cybersecurity challenges facing organizations across the...
Sepio Systems, a leader in the Rogue Device Mitigation (RDM) market, introduces the next generation...
The Akamai Guardicore Platform simplifies enterprise security with broad visibility and granular...
Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more