Security
Software Companies Adopting “Ring of Defense” Licensing Strategy to Reduce Hacker Theft
According to a study from IDC and Flexera Software, a significant proportion of software companies…
Akamai Launches Cloud Networking to Accelerate and Secure Cloud-based Applications for Enterprise Branch Offices
New Services Designed to Address Performance, Connectivity, and Security Challenges of Hybrid WAN and Direct…
Protected Health Information shows up in 90 percent of sectors, not just healthcare
Initial findings from Verizon’s inaugural Protected Health Information Data Breach Report suggests securing PHI Data…
New Research Examines Real-World Networks’ Exposure to Credential Theft Attacks and Complete Network Compromise
CyberArk, the company that protects organidations from cyber attacks that have made their way inside the network…
Trend Micro and VCE expand strategic alliance to offer easy and seamless solution to secure hybrid cloud
Trend Micro Incorporated has announced it has joined the VCE Select Program, to bundle Trend Micro…
A10 Networks Expands Portfolio of Security Solutions with the Introduction of the New Thunder Convergent Firewall
Thunder Convergent Firewall offers leading security features with high-performance, scale-out A10 Harmony architecture A10 Networks has…
Blue Coat Delivers Industry’s First Complete Cloud Security Solution with Acquisition of Cloud Security Innovator Elastica
With the addition of Elastica, Blue Coat defines the security stack for the cloud generation:…
ForgeRock Accelerates Asia Pacific Expansion with New Regional Vice President Appointment
John Donovan to Support the Rapid Sales Growth of ForgeRock’s Identity Platform, Popular Among Organisations…
Why dedicated workplace mobile devices are vital to information security
The use of mobile devices in the workplace is the new normal for employees of…
(ISC)2 Advisory Council Member Prof. Jill Slay Selected as InfoSec Educator of the Year by Australia Information Security Association
Internationally-Recognized Educator and Cybersecurity Expert Named Inaugural Award Recipient (ISC)² (“ISC-squared”) has announced that its Asia-Pacific…
29% of us take our phones into the bathroom, despite the risk of being hacked or spied on
The relationship between users and their digital devices is often closer than that of best…
Centrify partners with leading Cloud Access Security Brokers to enhance cloud security for SaaS applications
Centrify has formed technology integration partnerships with five leading cloud access security brokers (CASBs): CloudLock,…
IronKey Appoints A/NZ Regional Manager
IronKey has announced the appointment of Tony Stratton as Regional Manager for Australia and New Zealand.…
Angler and Nuclear Exploit Kits Integrate Pawn Storm Flash Exploit
When it comes to exploit kits, it’s all about the timing. Exploit kits often integrate…