Most organizations can’t access critical security data
Many enterprises feel that their security processes are failing to meet their potential due to a lack of coordination, benchmarking, and proactive improvement among the …
Many enterprises feel that their security processes are failing to meet their potential due to a lack of coordination, benchmarking, and proactive improvement among the …
In this video, recorded at RSA Conference 2011 in San Francisco, Qualys Chairman and CEO Philippe Courtot talks about the myriad of innovations coming from the company: Next …
We’ve all heard about HBGary Federal’s COO Aaron Barr’s claims that he leveraged the information gathered on various social networks to discover the …
In this RSA Conference 2011 video showcase, you can check out the look and feel of the event and the expo floor. The companies featured in the video are Qualys, Secunia, …
As a new participant to the RSA Conference, LynuxWorks demonstrated its LynxSecure high-performance, secure virtualization platform. The LynuxWorks platform allows multiple …
The expo floor is teeming with knowledge, solutions and possibilities: The Secunia booth. Splunk demoing their product. The Cenzic booth. The Motorola AirDefense booth. Ivan …
Gemalto announced that its Strong Authentication Server and Protiva OTP Tokens have been integrated with Microsoft DirectAccess. The Protiva OTP token adds another layer of …
A study based on a survey of more than 10,000 information security professionals worldwide finds that a growing number of technologies being widely adopted by businesses are …
Axway introduced large enterprise clustering for its SecureTransport offering. SecureTransport simplifies and secures file transfers between people, sites, applications and …
The new borderless organizations have dramatically changed the definition of how, when and where people work, causing a need to redefine the way security solutions are built …
nCircle announced that its solutions now audit for over 40,000 conditions including vulnerabilities, configurations, operating systems and applications. The company also …
As the threat landscape is evolving on a daily basis, it is imperative that organizations and their IT security teams are aware of the latest vulnerability threats. Perimeter …