Third-party hosting and maintenance used to manage virtualization

Less than one-third of businesses keep their virtualisation servers on-premises and managed entirely by their own internal IT staff, according to a Kaspersky Lab survey of 3,900 IT professionals worldwide. As virtual infrastructure increasingly handles more business-critical services, the reliance on external hosting and management services raises potential security concerns, particularly for smaller businesses.

Read More

A10 Networks Security Alliance forms a platform to interconnect security solutions

A10 joins forces with leaders RSA, Arista, FireEye, FlowTraq, IBM Security, Ping Identity, Pulse Secure, Symantec, Vectra, Venafi, Webroot and more to help stem the rising tide of cyber security threats.

Read More

Exostar and BTG upgrade relationship

Alliance will enable secure collaborative research environments in the cloud for Life Sciences organizations and their partners worldwide.

Read More

Younger employees anxious about company’s ability to tackle growing security threats.
Nearly three quarters (71%) of CIOs find new computing devices that they didn’t previously know...
Half of all UK businesses (49%) believe they have unknown third-party devices on their networks, an...
Study finds performance, skills, and costs remain biggest hurdles to true data-driven security.
Outgunned security executives navigate complex obstacles to keep rising attacks from turning into...
Third instalment of 2019 Security Report highlights the cloud and mobile attack vectors used to...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more