NEWS
Meet the Prairie Dogs: Preventing Future Attacks

All seems peaceful in the burrow, but watch how the prairie dogs respond after an attack and fortify their defenses. Check out our series of videos to see how the prairie dogs use Cisco's simple, open, and automated approach to security to effectively fend off predators from every angle.

Watch Online
NEWS
CenturyLink Business: It is Time to Calculate the Cost of Digital Security

Dale Partridge, founder of Startupcamp.com, explains the importance of digital organization and the risks associated with disorderly data. Regardless if your business is small or mid-sized, it's only as strong as the technology that protects it.

Watch Online
NEWS
From threats to protection technologies

Building security technologies that allow us to detect sophisticated targeted attacks is a much more complicated task then creating another extension for an anti-virus. It is not just about a new malware on a given PC or mobile device. It is about looking at the cyber landscape on a much larger scale. It involves analyzing not just the separate files but the whole data flow. Distinguishing thousands of patterns, detecting the usual ones and those that shouldn't be there.

Watch Online
NEWS
RSAs Niloofar Razi Howe & Zulfikar Ramzan on the Future of the Market at RSA Charge 2016

Niloofar Razi Howe and Zulfikar Ramzan offer their insights and predictions for the information security and risk management markets at RSA Charge 2016.

Watch Online
NEWS
Does There Have to be a Trade-Off Between Security, Scalability, and Speed?

Akamai on how enterprises can achieve optimum digital performance without compromise. AKAMAI - John Dillon, Vice President of Global Marketing, Web Performance and Security.

Watch Online

News

Cyware has released new research revealing that a majority see the importance of having a Threat Intelligence Program and have started a Program.
Vanta has released its Trust Maturity Report, offering a data-driven look at how organizations are evolving their security programs in an increasingly complex risk landscape.
iPronics and Ansys announce a collaboration to accelerate the development of next-generation photonic integrated circuits (PICs).
From today, Cubbit’s storage technology is deployed and available across Rai Way’s edge data centres, enabling customers to rely on highly secure infrastructure — even in remote or low-connectivity areas.

Expert Opinions

By Carl Windsor, Chief Information Security Officer, Fortinet.
By Sebastian Murphy, Technical Director - Data Centers EMEA, blu-3, Shaheed Salie, Technical Manager, blu-3, and Warren McTackett, blu-3.
By Laurent Doguin, Director, Developer Relations & Strategy, Couchbase.
New report uncovers identity security risks, low initial assessment scores, and urgent need for remediation across Active Directory, Entra ID, and Okta - but substantial score improvements for users applying...