AlienVault works with HP

AlienVault plans to work with HP to broaden the reach of cyber threat intelligence sharing to support more organizations in staying ahead of emerging attacks. As part of the effort, HP intends to integrate data from AlienVault Open Threat Exchange (OTX) into HP Threat Central, its cloud-based threat intelligence sharing and analysis platform. 

Read More

FireMon 'reinvents' Security Monitoring 

FireMon has released a significant advancement of its core platform through the introduction of Security Manager 8.0. Leveraging highly automated analysis and monitoring of security infrastructure, Security Manager 8.0 delivers previously unavailable capabilities to identify and resolve emerging gaps in network defence.

Read More

Sugar joins BeyondTrust 

Former Northrop Grumman Chairman and CEO Dr. Ronald D. Sugar joins privileged account management and vulnerability management leader

Read More


Security, reliability and customer service matter most

Managed services providers (MSPs) are more focused than ever on managing endpoints and using remote monitoring and management (RMM) solutions to increase visibility and scale to meet the ongoing demands of managing cloud-based solutions, according to a new Autotask survey of MSPs.

Read More

Toad for Oracle 15.0 provides additional resiliency against vulnerabilities, malware and cyber...
Study also reveals security professionals overwhelmingly view insider threats as a dangerous...
Over half of CIOs are apprehensive about business interruptions due to expired machine identities.
Netwrix survey reveals that employees at 54% of educational organisations use cloud applications to...
Tripwire has published the results of an extensive study conducted by Dimensional Research and...
The need for organisations to better manage and secure the devices and applications that employees...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more