Articles for Security

Seclore’s Enterprise Rights Management solution adds usability innovations

New features include native document editing for Mac, password free file access and support for Google authentication

Read More
Akamai releases fourth quarter 2016 State of the Internet / Security Report

Q4 report highlights a 140 percent Year over Year increase in DDoS attacks greater than 100 Gbps SQLi web application attacks increased by 44 percent Year over Year

Read More
RSA challenges enterprises to reimagine their identity strategies

The new identity assurance services offerings are designed to address current challenges organizations face in today’s evolving world of security.

Read More
IBM Delivers Watson for cyber security to power cognitive security operations centers

The need to introduce cognitive technologies into security operations centers will be critical to keep up with the anticipated doubling of security incidents over the next five years and increased regulation globally

Read More
Verizon report shows data breaches spreading throughout the organization

Data breaches are becoming more complex and are no longer confined to just the IT department, but are now affecting every department within an organization. Each breach leaves a lingering, if not lasting imprint on an enterprise, finds Verizon’s 2017 Data Breach Digest

Read More
Palo Alto Networks delivers industry-first capabilities to prevent credential theft and abuse

New capabilities delivered in Palo Alto Networks next-generation security platform Operating System, PAN-OS 8.0

Read More
Norton Research: Parents Worry Children are More Likely to be Bullied in the Online World than on a Playground

Norton by Symantec (NASDAQ: SYMC), today released findings from the 2016 Norton Cyber Security Insights Report: Family Edition, which sheds light on parents’ perceptions of cyberbullying and the preventative measures they are putting in place to protect their children.

Read More
Why Integrated Security Is Key to Tackle Advanced Threats

Staying ahead of external attacks, malicious insiders, and costly fraud demands continuous security and compliance monitoring and the ability to respond to known, unknown, and advanced threats quickly.

Read More

Stay in the know with our newsletter