A fifth of companies lack continuous encryption for personally identifiable information, and only half have the systems required to meet Articles 16 and 17 of the GDPR legislation.
Read MoreBusinesses urged to protect themselves against cyber crime after new statistics show over four in ten of businesses and two in ten charities suffered a cyber breach or attack in the past 12 months.
Read MoreData centre and managed service provider, The Bunker, has selected technologies from Palo Alto Networks as part of its ongoing commitment to uphold the highest security standards for its customers.
Read MoreSynopsys has released new data that highlights the opportunities and challenges of DevSecOps, an emerging paradigm in which DevOps teams incorporate application security into their continuous integration and continuous delivery (CI/CD) workflows.
Read MoreA significant percentage of U.S. companies are uncertain about or unprepared for the European...
Read MoreZadara says that its award-winning Zadara Storage Cloud and VPSA® services adhere ...
Read MoreArcSight Enterprise Security Manager (ESM) 7.0 enables Security Operations Centres (SOCs) to become...
Read MoreGround-breaking study, commissioned by Bromium, highlights emergence of Platform Criminality,...
Read MoreA10 Networks says that a global tier-1 Cloud Service Provider has selected and deployed Thunder...
Read MoreAs they struggle to deal with the speed of business process automation and the exponential...
Read MoreNew analysis has found that over the last three years, 35% of all major data breaches were caused...
Read MoreA10 Networks has introduced A10 One-DDoS Protection, featuring software enhancements to its...
Read MoreMimecast has published its quarterly Email Security Risk Assessment (ESRA), a report of tests...
Read MoreNew functionality tackles publicly exposed cloud data; core secure configuration functionality now...
Read MoreBreakingPoint Cloud delivers realistic attack simulations and quantifiable test results to...
Read More