Top three security concerns for CSOs and CIOs

The breakneck speed of technology evolution, the ever changing threat landscape, and the increasing flexibility, ingenuity and persistence of cyber attackers have made …

Three BYOD problems that need to be solved

The Bring Your Own Device (BYOD) phenomenon has long stopped being just a fad and the option has become a crucial part of keeping employees and contractors happy and …

Video: Art Coviello interviews Tony Blair

At the RSA Conference 2012 in San Francisco last week, Art Coviello, Executive Vice President of EMC interviewed Tony Blair, former Prime Minister of Great Britian.

Identity, app and mobile device monitoring

Lancope unveiled the latest version of its StealthWatch System, which harnesses the power of NetFlow and other flow data from existing infrastructure to cost-effectively …

Real-time session monitoring by Cyber-Ark

Cyber-Ark Software announced real-time session monitoring capabilities that enable immediate termination of suspicious activity. With the recent release of its Privileged …

Protection for data in the cloud

Fasoo announced three security solutions that enable protection for data in the cloud. The Fasoo Usage Tracer (FUT) enables information governance by allowing organizations to …

Video: RSA Conference 2012 showcase

The world’s top information security professionals and business leaders gathered in San Francisco for RSA Conference 2012. Here’s a closer look at the show. For …

Trend Micro unveils APT management solution

Trend Micro announced Deep Discovery, a threat management solution designed to help large enterprise and government organizations combat advanced persistent threats (APTs) and …