Unisys unveils Stealth solution

New Unisys Stealth for Mobile solution protects against data breaches and other cybersecurity risks created by proliferation of consumer devices in the workplace.

Read More


Beta release of Red Hat Enterprise Linux 6 now available

To keep pace with the demand for enterprise-class infrastructure, the newest version of the leading Linux platform, the beta release of Red Hat Enterprise Linux 6.5, extends its scalability and manageability to aid in the build-out and control of large, complex IT environments. For example, Red Hat Enterprise Linux 6.5 will be designed to simplify the operation of mission-critical SAP applications by automating the optimal configuration of common SAP deployments.

Read More


Global study shows need for C-level leadership

Capgemini Consulting, in partnership with MIT Sloan Management Review, has announced the findings of a new global research survey into Digital Transformation – the opportunity for radical business change offered by the convergence of new digital technologies such as social media, mobile, analytics, and embedded devices. The study, “Embracing Digital Technology: A New Strategic Imperative,” reveals that while the potential opportunity of Digital Transformation is absolutely...

Read More

Becrypt continues innovation

Latest version of Advanced Port Control provides the only CAPS approved Port Control solution for high grade security levels.

Read More

Three quarters (73%) of UK small and medium-sized business leaders think their workforces lack the...
Despite staggering interest, a top barrier to implementing Zero Trust strategies is, surprisingly,...
CISOs are motivated by being the ‘business bodyguard’ despite growing pressures on the job, new...
Bromium has published “Endpoint Exploitation Trends 2015,” a Bromium Labs research report...
Delivers Zero Trust OT/IT security approach for office and production networks.
Industry data also indicates a positive trend in salary and job satisfaction over past three years,...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more