Technology
Protected Health Information shows up in 90 percent of sectors, not just healthcare
Initial findings from Verizon’s inaugural Protected Health Information Data Breach Report suggests securing PHI Data…
New Research Examines Real-World Networks’ Exposure to Credential Theft Attacks and Complete Network Compromise
CyberArk, the company that protects organidations from cyber attacks that have made their way inside the network…
Trend Micro and VCE expand strategic alliance to offer easy and seamless solution to secure hybrid cloud
Trend Micro Incorporated has announced it has joined the VCE Select Program, to bundle Trend Micro…
A10 Networks Expands Portfolio of Security Solutions with the Introduction of the New Thunder Convergent Firewall
Thunder Convergent Firewall offers leading security features with high-performance, scale-out A10 Harmony architecture A10 Networks has…
Blue Coat Delivers Industry’s First Complete Cloud Security Solution with Acquisition of Cloud Security Innovator Elastica
With the addition of Elastica, Blue Coat defines the security stack for the cloud generation:…
Why dedicated workplace mobile devices are vital to information security
The use of mobile devices in the workplace is the new normal for employees of…
(ISC)2 Advisory Council Member Prof. Jill Slay Selected as InfoSec Educator of the Year by Australia Information Security Association
Internationally-Recognized Educator and Cybersecurity Expert Named Inaugural Award Recipient (ISC)² (“ISC-squared”) has announced that its Asia-Pacific…
29% of us take our phones into the bathroom, despite the risk of being hacked or spied on
The relationship between users and their digital devices is often closer than that of best…
Centrify partners with leading Cloud Access Security Brokers to enhance cloud security for SaaS applications
Centrify has formed technology integration partnerships with five leading cloud access security brokers (CASBs): CloudLock,…
Angler and Nuclear Exploit Kits Integrate Pawn Storm Flash Exploit
When it comes to exploit kits, it’s all about the timing. Exploit kits often integrate…
Hardware Encryption Market is Expected to Reach $296.4 Billion, Worldwide, By 2020
A new report by Allied Market Research titled, “World Hardware Encryption—Market Opportunities and Forecasts, 2014–2020”…
Hewlett Packard Enterprise Introduces New Partner Program
Hewlett Packard Enterprise (HPE) has unveiled the details of its new partner program, Partner Ready. Partner…
VSTEP and Poseidon team up to bring maritime simulator innovation to the Philippines
Leading simulator developers join forces to deploy acclaimed maritime simulators in the region. Joint simulator showroom…
Centrify announced as Premier Partner in Dropbox’s new Partner Network
Centrify has announced it has been selected as a Premier Partner in Dropbox’s new Partner…