Unveils two enhanced UTM appliances, Sophos UTM 525 and 625 and the Sophos RED 50.
Half of employees who left or lost their jobs in the last 12 months kept confidential corporate data, according to Symantec, and 40 percent plan to use it in their new jobs.
A CISO is someone who understands security with all its ramifications and not just someone promoted from another domain to fill in the shoes, says Sundar Ram Gopalakrishnan.
A number of M2M vendors have already started putting more emphasis on M2M application security in a bid to anticipate future market opportunities, finds ABI Research.
Gartner positions vendors in the Leaders quadrant based on their completeness of vision and ability to execute.
VASCO shares some best practices that will help the BFSI sector deal with recent cybersecurity threats.
Malware targeting Android up sixfold during Q3, with viruses possibly able to feed information from the likes of banking apps, warns Trend Micro.
The hackers accessed a system that Bit9 said it uses to digitally sign its software to let customers know it is safe to run on their computers.
The lack of appropriate security has already allowed a number of destructive cyber-attacks to lay waste to some of the most high-profile companies in the industry, says ABI Research.
This release also integrates with privileged identity management software such as CyberArk to address the increased security concerns prevailing in enterprises today.
They disrupted a global cybercrime operation by shutting down servers that controlled hundreds of thousands of PCs.
BlackBerry to use Trend Micro's app scanning service to further analyse apps submitted to BlackBerry World.
Kamlesh Bajaj, CEO, DSCI talks about its initiative with the government and how data protection should not be restricted as an enterprise priority but become a national initiative.
Cisco research reveals mainstream threats that are magnified by the world's next generation of workers' online behaviour.
Mobile devices pose latest challenge to authentication and SSO, finds Gartner.
The company advanced in the "ability to execute" category between the 2011 and 2013 reports.
Bugs in widely used networking technology expose tens of millions of personal computers, printers and storage drives to attack by hackers over the regular Internet.
This marks the fifth consecutive time that RSA has been placed in the DLP "Leaders" quadrant.
Sorry, but "IT DEPENDS". As many tough questions in life, this one has no single right answer.
RSA Archer solution and mobile app helps customers prepare for and minimise impact of business disruptions.
New privileged session management capability addresses insider and advanced threats with security and auditing of SSH sessions.
Two-factor authentication protects against intruders and secures mission-critical business operations.
Report highlights shift to include identity and access governance to meet business needs.
Fake market called Android Express's Play has drawn over 3,000 visits in a week, resulting in potential theft between 75,000 and 450,000 pieces of personal info.
McAfee has announced its strategy for building upon Security Connected, the framework in which security products and services work together to safeguard businesses with better protection.
The perceived cost of implementing their plans is reported to be the most common reason why organisations are lagging in plan implementation.
The proposed architecture will involve monitoring, certification and assurance of networks by designated agencies and bodies in accordance with the law.
Tom Scholtz, VP Distinguished Analyst, Gartner speaks on dealing with security budget cuts and expanding the definition of ROI with respect to InfoSec initiatives.
According to Kaspersky Lab data, the share of spam in email traffic decreased steadily throughout 2012 to hit a five-year low.
Virtual appliance offers remote access security.