Latest News

  • Qualys, Inc., a pioneer and leading provider of cloud-based security and compliance solutions with over 6,000 customers worldwide, will be exhibiting at Infosecurity Europe 2014, which takes place in Earl’s Court, London, from April 29 through May 1.
  • LockLizard is celebrating its 10th birthday as a purveyor of document digital rights management (DRM) security solutions to both the world’s largest corporate bodies just as much as to niche specialist players. A decade on, the company looks back on the changes over that time
  • Nebraska-based Linoma Software has released its GoAnywhere File Transfer app for the iOS and Android mobile operating systems
  • secunet and Microsoft Germany are showing how a reliable, highly secure and ultra-mobile solution can become reality through a combination of security technology made in Germany and a high-performance tablet.
  • An initiative that cuts across the security vendor landscape is one way that Exclusive Networks helps customers turn their preventive technologies into a problem solver in the aftermath of a data breach incident
view more

Trending Topic - #Heartbleed

Blogs

  • Posted by Ernst & Young LLP • 16 April 2014
    By Mark Brown Much has been made of Microsoft’s decision to stop security support for Windows XP over the last few weeks. Some commentators have likened it to something of a Y2K-esque tech apo...
    rated:
  • Posted by IRM Plc • 14 April 2014
    By Punam Tiwari On my return home from my Cheltenham Head Office one evening, I happened upon an opinon article quite randomly lying around in the train by David Aaronovitch of The Times, titled...
    rated:
  • Posted by Bob Tarzey • 21 March 2014
    It will not be news to anyone who has written code that the time to kill software bugs is early on in the application development lifecycle, before they can have a major impact. This is important for ...
    rated:
  • Posted by Drew Amorosi • 17 March 2014
    Nine months and counting – nine months since Edward Snowden first told the world that the US government logged the metadata of all telephone traffic. Shortly after came PRISM, involvement by the...
    rated:
view more

Features

view more
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×