Technology

Practitioners Give Global Cybersecurity a “C” According to New Research from Tenable Network Security
International survey of information security professionals identifies cloud, mobile devices and board-level involvement as common…

Dell Takes Endpoint Security to a New Level with Cylance Advanced Threat Protection Technology
Dell to incorporate Cylance technology into its Dell Data Protection endpoint security solution New Dell…

Four considerations to make sense of today’s business technology
Today’s business landscape is crowded with emerging enterprise technology, which presents new opportunities and questions.…

Blackberry releases key enhancements to enterprise software platform
Expanded capabilities offer greater security, productivity and collaboration across iOS, Android and BlackBerry 10 and…

Sonardyne’s Sentinel sonar extends capabilities of Fortem’s Omnipresence 3D security management software
Maritime security company, Sonardyne International Ltd, has announced that its market leading Sentinel Intruder Detection…

Software Companies Adopting “Ring of Defense” Licensing Strategy to Reduce Hacker Theft
According to a study from IDC and Flexera Software, a significant proportion of software companies…

Akamai Launches Cloud Networking to Accelerate and Secure Cloud-based Applications for Enterprise Branch Offices
New Services Designed to Address Performance, Connectivity, and Security Challenges of Hybrid WAN and Direct…
Protected Health Information shows up in 90 percent of sectors, not just healthcare
Initial findings from Verizon’s inaugural Protected Health Information Data Breach Report suggests securing PHI Data…

New Research Examines Real-World Networks’ Exposure to Credential Theft Attacks and Complete Network Compromise
CyberArk, the company that protects organidations from cyber attacks that have made their way inside the network…

Trend Micro and VCE expand strategic alliance to offer easy and seamless solution to secure hybrid cloud
Trend Micro Incorporated has announced it has joined the VCE Select Program, to bundle Trend Micro…

A10 Networks Expands Portfolio of Security Solutions with the Introduction of the New Thunder Convergent Firewall
Thunder Convergent Firewall offers leading security features with high-performance, scale-out A10 Harmony architecture A10 Networks has…

Blue Coat Delivers Industry’s First Complete Cloud Security Solution with Acquisition of Cloud Security Innovator Elastica
With the addition of Elastica, Blue Coat defines the security stack for the cloud generation:…
Why dedicated workplace mobile devices are vital to information security
The use of mobile devices in the workplace is the new normal for employees of…

(ISC)2 Advisory Council Member Prof. Jill Slay Selected as InfoSec Educator of the Year by Australia Information Security Association
Internationally-Recognized Educator and Cybersecurity Expert Named Inaugural Award Recipient (ISC)² (“ISC-squared”) has announced that its Asia-Pacific…