Trustwave adds to managed security offering

Trustwave has announced new and enhanced managed security services designed to help businesses address advanced information security threats while alleviating the pressures created by resource constraints, skills shortages, compliance requirements and the rapid adoption of new technologies.

Read More

FireEye report reveals possible malware “Cyber Arms Dealer”

FireEye, Inc. has announced the release of a new report, Supply Chain Analysis: From Quartermaster to Sunshop. The report details how many seemingly unrelated cyber attacks may, in fact, be part of a broader offensive fueled by a shared development and logistics infrastructure — a finding that suggests some targets are facing a more organized menace than they realize.

Read More

Acronis delivers enterprise-grade control and security for mobile file access and sharing in the Enterprise

Acronis® has released activEcho® 3.0 and mobilEcho® 5.0, providing enterprise-level management combined with consumer-grade simplicity for secure file access, synchronisation and sharing on mobile devices. These two products now include the Acronis Policy Engine, which provides granular management capabilities to create security policies and ensures control and compliance on all devices.

Read More

Trustwave acquisition bolsters data protection

Trustwave has announced the acquisition of data security provider Application Security, Inc. The company’s automated database security scanning technologies strengthen Trustwave’s ability to help organisations protect high-value data, reduce security risks and achieve compliance with mandates and regulations.

Read More


Stonesoft NGFW 5.6 update introduces API and enhanced virtualisation support

The cyber security expert Stonesoft, A McAfee Group Company, releases version 5.6 of its visionary Next Generation Firewall (NGFW). The release enables straightforward integration between the Stonesoft Security Management Center and 3rd party management systems as well as expands the virtual engine support to all available network security roles of Stonesoft NGFW.

Read More

Yet only four out of 10 security leaders in the UK can answer the question, “How secure, or at...
In the future, seamless travel technology will enable people to transfer from their home to the...
Report finds that removing admin rights from endpoints would mitigate 77% of all Critical Microsoft...
Institute secures its networks and mobile devices using Check Point’s advanced threat...
Avast research finds over half of SMB IT Decision Makers are more concerned about cyber security...
Ping Identity and iC Consult deliver flexible identity solutions to support employees, partners and...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more