Back to homepage

The everyday application interactions putting enterprises at risk

With greater awareness about the risks of unsecured privileged accounts allowing broad, anonymous access across the enterprise, privileged account security has become an organizational priority. The privilege problem is proliferating.


Top 12 cloud computing threats in 2016 – Help Net Security

The Cloud Security Alliance (CSA) Top Threats Working Group released at RSA Conference an important new research report about cloud computing threats, developed to serve as an up-to-date guide to


Senior level perceptions about SAP security

More than half of companies believe it is likely their company would have a data breach due to insecure SAP applications, according to a new Ponemon Institute study. This same

Industry Insights

Are CIOs Really Making Security a Top Priority?

CIOs repeatedly say “Security is a top priority.” But, how can that be? The truth is that most apps out there are incredibly insecure. CIOs and developers are in a

Vendor News

Webroot and HPE team up for more network security

Security firm Webroot announced today it is partnering up with Hewlett Packard Enterprise, to give HPE’s users more security features. Under the partnership, HPE ArcSight Enterprise Security Management (ESM) users will now

Identity Theft

Identity theft: What it is and how to avoid it – Smart Business Network

Of all the things that can be stolen, your identity is probably the most damaging. While material items can be replaced, your identity can cause an array of issues —


Akamai speeds Australian DDoS blocking as botnets-for-hire make attacks shorter, more frequent

Australian targets of distributed denial of service (DDoS) attacks will see a “dramatically increased” user experience after DDoS-blocking content distribution network (CDN) operator Akamai marked continuing surges in DDoS volumes