Voltage SecureData z/Protect provides reliable, standards-based protection of sensitive data on IBM mainframes

Voltage Security has announced significant enhancements to Voltage SecureData z/Protect™ that make it easy to implement and manage data protection on z/OS, natively and with full interoperability with other Voltage SecureData™ components. The new Voltage SecureData z/Protect continues...

Read More
Kroll joins “Bit9 + Carbon Black Connect” Alliance Program

Kroll uses Carbon Black to rapidly detect and respond to attacks and accelerate remediation efforts for enterprise customers.

Read More
A10 Networks and Webroot partner

A10 customers can satisfy security and regulatory requirements by decrypting SSL traffic while excluding traffic to regulated data and sensitive sites like banking and healthcare.

Read More
Cisco report highlights weak links in increasingly dynamic threat landscape

The Cisco 2014 Midyear Security Report examines the "weak links" in organizations that...

Read More
Alert Logic helps clckwrk secure business critical Oracle applications

Alert Logic Intrusion Detection and Log Management capabilities improve Oracle business application...

Read More
Validation update

Login VSI, Inc. announces Login VSI 4.1, a substantial update to its flagship product. Login VSI is...

Read More
IT security market grows

According to IT Security, a new Market Report from business intelligence provider Key Note, the UK...

Read More
OpenStack Summit heads to Europe

For the first time, the OpenStack® Summit is coming to Europe. The 10th OpenStack Summit will...

Read More
PCI Compliance contributes to false sense of security

Tripwire, Inc. has announced the combined results of a 2014 retail cybersecurity survey conducted...

Read More
Alert Logic announces security solutions for Google Cloud Platform

Alert Logic first to deliver IDS and log management capabilities to Google cloud customers.

Read More
Integrated endpoint threat prevention, detection and response

Bit9 Security Platform v. 7.2, Carbon Black v. 4.2 and the new Threat Intelligence Cloud combine to...

Read More
Securing your virtual environment

By David Phillips, product manager, Wick Hill.

Read More
UKAS accredits Certification International for latest information security management standard

Certification International, a leader in the assessment and certification of international,...

Read More
375 million customer data records compromised in 2014

Identity theft main reason for breaches and survey shows 40 per cent of consumers very unlikely to...

Read More

Videos

Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
Keith Young, Global Head of Last Mile Services at Arvato, explains how the recent entry into the US data centre market is the latest step in the strategic integration of ATC, the Irish logistics company that...
Eric Herzog, Chief Marketing Officer at Infinidat, outlines how and why Infinidat has seen outstanding success with the launch of the InfiniBox® G4 Family, creating a new foundation for the future with...

Expert Opinions

By Andre Jay, Director of Technology at Warp Technologies.
By Giedrius Steimantas, Engineering Manager, Oxylabs
By Steve Leeper, VP of Product Marketing, Datadobi.