Integrated solution combines BMC BladeLogic and Qualys Vulnerability Management to quickly identify and remediate threats and boost collaboration between Security…
Browsing: Breaches
“There are only two kinds of companies. Those that were hacked and those that don’t yet know they were hacked.”…
As we kick off 2015, I predict that this will go down in history as the year of the Threat…
10x increase of secure browser activations and 9x increase of secure instant messaging activations in 2014 highlight shift to secure…
A new report from Intel Security reveals the latest persuasion techniques leveraged by cybercriminals to manipulate employees.
Following the news that RBS is to use fingerprint recognition technology in its mobile application.
Recent independent research[1] commissioned by Ping Identity®, the Identity Security Company™, has revealed the disconnect between perception and reality when it…
A report by the Intercept claims that American and British spies jointly hacked into Gemalto to get hold of encryption…
Charles Foley of Watchful Software provides a few tips for businesses when considering what to do next in order to keep data secure.
Cyber resiliency fuels company growth; new Ponemon Institute study will help define and measure cyber resilience in collaboration with leading…