E-Commerce and Retail

As we're nearing the end of 2014, Stephen Coty, chief security evangelist at Alert Logic, takes a retrospective look at some of the industries hardest hit by data breaches/vulnerabilities and looks to 2015 and beyond to discuss new and emerging malware.

Read More




Connected identity at the centre of everything

ForgeRock Inc. is updating its ForgeRock® Identity Platform, the first massively scalable, 100-percent commercial, open-source solution for Identity and Access Management (IAM), with new releases of OpenAM 12.0, OpenIDM 3.1 and OpenIG 3.1.

Read More

Mobility spurs major changes in enterprise governance strategies

Enterprise mobility and the proliferation of endpoints are driving profound changes in how organisations handle information governance, according to a Forrester Consulting survey commissioned by Druva. Companies are planning significant increases in governance-related spending, accelerated centralisation of governance programs, greater inclusion of endpoint content in eDiscoverydata collection initiatives, and others measures designed to address concerns over both the volume and the...

Read More

UK CISOs and IT Managers feel isolated and fearful of losing jobs as data breach wave rolls in,...
Vormetric has announced the Vormetric Cloud Partner programme. Created specifically to address the...
Venafi has published the results of a study conducted by Dimensional Research. The study...
Infoblox has launched Infoblox Identity Mapping, which bridges the gap between network security and...
Business email compromise (BEC) and ransomware attacks prove most costly phishing threats to large...
Data studied by Atlas VPN reveals that blackmail and ransomware attacks spiked by 140% in 2019 in...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more