Please turn on your JavaScript for this page to function normally.
Platform for cloud-based secure data delivery services

DataMotion announced the next generation of its DataMotion Platform. Available as a public, private or hybrid cloud solution, the platform-as-a-service (PaaS) makes it simple …

The sad reality of data security

Hacktivists, criminals, nation states, malicious or careless insiders – all these are fueling the need for data protection and risk management within enterprises. The …

SecureState partners with Qualys for cloud-based security and compliance

SecureState announced a partnership with Qualys. Under the partnership, SecureState will offer IT security and compliance cloud services from Qualys while providing its …

Private cloud solution designed to meet compliance requirements

Terremark, a Verizon Company, launched Enterprise Cloud Private Edition. This private cloud solution is designed as a single-tenant environment to meet the security compliance …

ISO 27001 implementation: How to make it easier using ISO 9001

ISO 27001 and ISO 9001 may seem like quite different standards, but when you take a closer look at both, you can find a lot of similarities. They have the same …

UK enterprises fear EU Data Protection Act

The proposed EU General Data Protection Regulation could spell trouble to UK businesses, says independent IT integrator SecureData, as its “EU General Data Protection …

Manage Linux and UNIX privileged access

BeyondTrust released PowerBroker Servers Enterprise which allows organizations to seamlessly manage privileged access on Linux and UNIX systems across dynamic physical, …

Top cause of data breaches? Negligent insiders

Negligent insiders are the top cause of data breaches while malicious attacks are 25 percent more costly than other types, according to the Ponemon Institute. The study also …

Cisco goes beyond BYOD

Employees are demanding not only to use their own devices at work, but also to have more flexibility in the way they work and when and where they work. The Cisco Connected …

Protect data and automate log management

Released today, WhatsUp Log Management 10.1.1 boasts pre-built, out-of-the-box reports, focused on complying with European-specific data protection regulations. The reports …

BS 25999-2: An overview of BCM implementation process

While many business continuity methodologies exist for more than 20 years, none of them have really managed to include business continuity in regular management duties – …

The practice of insecure collaboration

Most often sensitive information exchanged beyond the firewall with business partners and customers is still primarily conducted through email and consumer-grade file sharing …

Don't miss

Cybersecurity news