Robotics

CyberArk Delivers Cloud-Based Privileged Account Security to the Endpoint
CyberArk Viewfinity Integrates Privilege Management with Application Control to Help Protect Against Malware-Based Attacks Without…

As Demand for Information Security Professionals Grows, ISACA Credential Reaches Major Milestone
The demand for IT security personnel remains high in 2016, according to ISACA’s January 2016…

Cyber Security Delegation to Israel-Open to all from Asia, Australia and New Zealand
The Australia Israel Chamber of Commerce (AICC) will host a cyber security trade delegation to…

ESET’s 2016 Cybercrime Trends and predictions report
ESET, a global pioneer in proactive protection for 25-years, has released its ‘Trends 2016: (In)Security…

SimpliVity unleashes new programs and initiatives to help partners harness hyperconvergence demand
SimpliVity has announced new PartnerAdvantage programs and initiatives to deliver robust opportunities and strategic enablement to…

Despite Stagnant Enterprise Software Budgets, Waste Is Running Rampant According to New Flexera Software Report
Most organisations have shelfware, most are out of compliance with their software contracts, and most…

Tenable Network Security Supports Microsoft Azure, Securing Cloud Environments at the Speed of DevOps
Leading developer of next-generation cybersecurity software now provides enhanced security visibility across three major cloud…

Arbor Networks 11th Finds Relentless Threat Environment Driving Demand for Managed Security Services and Incident Response Support
Arbor Networks Inc., the security division of NETSCOUT, has released its 11th Annual Worldwide Infrastructure Security…

1 in 10 broadly shared files in cloud apps expose sensitive and regulated data, reveals new Elastica cloud threat labs report from Blue Coat
Enterprise shadow data threat on rise as cloud app usage surges in the enterprise, opening…

ISACA’s Cybersecurity Nexus Launches Tools to Help Cyber Pros Identify Controls and Navigate Their Careers
ISACA has launched two free digital tools through its Cybersecurity Nexus (CSX): Cybersecurity Career Road…

Testing demonstrates that Ixia Network Packet Broker delivers 100 percent packet processing for 100 percent network visibility
Ixia has announced the processing performance results of an Ixia-sponsored test conducted by the Tolly Group…

Taking the Necessary Leap
Cyber security concerns continue to evolve rapidly, with new threats emerging every day. Cyber actors…

A Recipe to Reduce Mobile App Security Risk
As businesses roll-out their BYOD strategies, most CIOs and CEOs have no idea that many…

Quortus Software Core Network Enables Mobile Edge Computing
First MEC-aligned implementation of cellular core enables innovative 4G services – and points the way…