Most IT Security Pros Believe Cyber-Attacks Are More Dangerous than Physical Attacks

Most IT Security Pros Believe Cyber-Attacks Are More Dangerous than Physical Attacks

Cyber-Ark has released its Global Advanced Threat Landscape Survey

Cloud Users Feared Someone Else Had Access to Their Data Even Before PRISM Revelations

Cloud Users Feared Someone Else Had Access to Their Data Even Before PRISM Revelations

F-Secure’s Digital Lifestyle Survey 2013 reveals some interesting things

Risks Associated with Migrating to the Cloud Can Be Easily Managed, Experts Say

Risks Associated with Migrating to the Cloud Can Be Easily Managed, Experts Say

The ISF has published a new study on data privacy in the cloud

Alert Logic Publishes Spring 2013 State of Cloud Security Report

Alert Logic Publishes Spring 2013 State of Cloud Security Report

The study compares attacks on enterprise data centers and cloud hosting providers

Fortinet Enters Definitive Agreement to Acquire Coyote Point

Fortinet Enters Definitive Agreement to Acquire Coyote Point

The details of the acquisition have not been made public

Cloud Security Study: BYOD, Data Control and Data Loss Are Main Inhibitors

Cloud Security Study: BYOD, Data Control and Data Loss Are Main Inhibitors

AccelOps has released its 2013 Cloud Security Survey

CA Study Shows Improvement in Cloud Security Practices

CA Study Shows Improvement in Cloud Security Practices

Experts say further progress could be made in this area

Virtualization and BYOD Have the Greatest Impact on Security, Study Finds

Virtualization and BYOD Have the Greatest Impact on Security, Study Finds

F5 Networks has performed a quick survey during the 2013 RSA Conference

Juniper Unveils Data Center Security Solution and Global Attacker Intelligence Service

Juniper Unveils Data Center Security Solution and Global Attacker Intelligence Service

Juniper Networks has presented its new products at the 2013 RSA Conference

UK Prime Minister to Sign Cybersecurity Agreement with India

UK Prime Minister to Sign Cybersecurity Agreement with India

David Cameron and his Indian counterpart will sign the deal today

ENISA Analyzes Cloud Computing from Perspective of Critical Infrastructure Protection

ENISA Analyzes Cloud Computing from Perspective of Critical Infrastructure Protection

The EU agency makes some important recommendations for organizations

Zscaler Unveils New Analytics Technology to Provide Real-Time Visibility into Global Traffic

Zscaler Unveils New Analytics Technology to Provide Real-Time Visibility into Global Traffic

The new platform takes Big Visibility to the next level

AlienVault Releases Unified Security Management 4.1 Platform

AlienVault Releases Unified Security Management 4.1 Platform

The new version provides security visibility for Amazon EC2

Dell Launches Vulnerability Management Services for Cloud and Virtual Environments

Dell Launches Vulnerability Management Services for Cloud and Virtual Environments

Dell SecureWorks has released VMS and WAS solutions

Cybercriminal Campaigns Will Rely Even More on the Cloud in 2013, Experts Say

Cybercriminal Campaigns Will Rely Even More on the Cloud in 2013, Experts Say

Imperva and Incapsula experts have shared some predictions for next year

Top 5 Security Predictions for 2013 from ISF

Top 5 Security Predictions for 2013 from ISF

Cyber security, big data, the cloud, the supply chain security and consumerization

Trend Micro Launches Online Assessment Tools for Cloud, Cyber and Mobile Security

Trend Micro Launches Online Assessment Tools for Cloud, Cyber and Mobile Security

Studies show that US organizations are far better prepared than ones from Japan

 
Want more? Browse: