WatchGuard's top 8 security predictions for 2014

Could a Hollywood hack come true? Will there be a U.S. Healthcare.gov data breach? Should you expect CryptoLocker clones?

Read More

Blue Coat acquires Norman Shark

Blue Coat Systems, Inc. has acquired Norman Shark, the global leader in malware analysis solutions for enterprises, service providers and government. The acquisition unites the industry’s most proven zero-day sandboxing technology with Blue Coat’s leading Advanced Threat Protection solution to help customers bridge the gap between identification of advanced persistent threats and resolution of those threats.

Read More


The race to stem cybercrime using biometrics is on

Aite Group assesses nine emerging technology vendors that could bring biometric authentication into mainstream use.

Read More

5 resolutions to prepare IT pros for 2014 trends

ISACA highlights Privacy 2.0, slimmed-down big data, heated-up cybersecurity and data analytics job market, outsourced security, and the Internet of even more Things.

Read More

Corero appoints new VP of Sales EMEA

Adrian Bisaz appointed to build on Corero’s success in defending against DDoS, and malicious cyber-attacks across EMEA.

Read More

Bomgar’s annual Privileged Access Threat Report highlights that privileged insider and...
44% of decision makers are spending a day each week dealing with cybersecurity issues.
The hub will be the first of its kind, enabling companies to quickly scope, define and maintain all...
SailPoint has found that 86% of IT experts in EMEA expect their organisation’s number of SaaS...
Study from nine-months of penetration tests by Rapid7 analyses the most effective methods hackers...
Over two-thirds of surveyed IT professionals believe cloud account takeovers are a significant risk...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more