corporate
Employees are deliberately disabling security controls
Corporate mobile devices and the bring-your-own-device (BYOD) phenomenon are rapidly circumventing enterprise security and policies, say the results of a new global study …
EMC unveils five new security advisory services
Virtualization, cloud computing, mobile technologies, and the emergence of a new class of Big Data applications have dramatically altered how organizations create, deliver, …
ManTech acquires HBGary
ManTech International, a provider of technologies and solutions for the US intelligence and defense community and various other federal government agencies, has announced that …
Surveying policies, controls and compliance
Qualys unveiled a new service for its QualysGuard Cloud Platform and suite of integrated applications for security and compliance to help businesses further automate their …
Most executives don’t pay attention to cyber risks
The advanced findings from the latest 2012 Carnegie Mellon CyLab Governance survey of how corporate boards and executives are managing cyber risks reveals the issue is still …
Shaping the future of information security
Once again, the Innovation Sandbox proved to be one of the most interesting events at RSA Conference 2012, as ten creative companies got a moment in the spotlight to present …
Automated managing of enterprise assets
Qualys announced the availability of hierarchical Dynamic Asset Tagging for its QualysGuard Cloud Platform and suite of applications for security and compliance. The …
A platform to stop APTs and malware
Bit9 announced the Bit9 Advanced Threat Protection Platform that protects all enterprise endpoints, servers and private clouds from cyber-attacks that bypass older antivirus …
Detection and securing of built-in passwords
Lieberman Software announced that the company’s privileged identity management product, Enterprise Random Password Manager (ERPM), now offers a solution to identify …
RSA enhances its threat intelligence delivery platform
RSA announced that RSA NetWitness Live service now provides 30 percent more threat content, customized content distribution capabilities and new integration with RSA’s …
Transformable security engine from Stonesoft
Stonesoft introduced the Stonesoft Security Engine, a transformable security engine that is capable of delivering seven enterprise-class product configuration modes to provide …
Log management deserves a company’s respect
Keeping and maintaining data logs is a corporate best practice and, in many cases, when you consider regulation and industry standards, it’s the law. Still, few …