Please turn on your JavaScript for this page to function normally.
40% of UK businesses breached due to spam

Businesses are still struggling to deal with the problems caused by spam, and nearly half of them have experienced a data breach as a result of employees clicking on malicious …

A holistic view of threat and vulnerability risk

Rapid7 and Modulo announced they are working together to deliver an holistic view of threat and vulnerability risk, correlated with broader regulatory, policy and compliance …

Virtual scanners for consultants, enterprises and the cloud

Qualys announced virtual scanner appliances for its QualysGuard Cloud Platform and suite of integrated applications for security and compliance. The new software-based virtual …

Cisco updates security certs

Cisco announced a major update to Cisco CCNA Security and CCNP Security certifications to deliver job-ready training designed to provide the most up-to-date information on new …

Federated identity solution based on virtualization

Radiant Logic announced the release of RadiantOne 6.0, a complete on-premises federated identity service based on identity virtualization. Featuring a dynamic set of tools …

Encryption critical to improved security posture

Encryption is finally seen as a strategic issue and organizations are increasing their investment in encryption across the enterprise in response to compliance regulations and …

Mobile one-time password app

OneLogin announced the debut of its mobile one-time password (OTP) app, which lets users perform multi-factor authentication with the click of a button. Available on all major …

Turning mobile devices into enterprise credentials

Entrust is extending its Entrust IdentityGuard strong authentication platform to offer smart credentials on mobile devices for enterprise-grade security. Taking advantage of …

Non-profit org aims to solve Internet’s security issues

Just thirty years from its initial appearance on the world’s computing stage, the Internet is now so embedded in business and society that life without it is almost …

A walk through the expo at RSA Conference 2012, part two

The expo floor at this year’s RSA Conference is bigger than ever, with numerous companies exhibiting for the first time. Here’s another look at the show floor, …

Employees are deliberately disabling security controls

Corporate mobile devices and the bring-your-own-device (BYOD) phenomenon are rapidly circumventing enterprise security and policies, say the results of a new global study …

EMC unveils five new security advisory services

Virtualization, cloud computing, mobile technologies, and the emergence of a new class of Big Data applications have dramatically altered how organizations create, deliver, …

Don't miss

Cybersecurity news