Building an effective Data Loss Prevention Program begins with the realization that DLP is a business utility, not an IT Security tool. To deliver operational value, security leaders need to identify and work closely with business leaders who can assist in formulating a strategic plan for the daily use and continuous maintenance of a DLP Program. ...  more>>
Tuesday, January 28, 2014
Google and Facebook has always been in news for wooing web servers, but Google seems to have taken a perfect shot this time by replacing the cookies. According to Jim Edwards of Business Insider...  more>>
Tuesday, February 18, 2014
The enterprise softwares shall now be better protected against the security, compliance and license threats with the latest version of the Component Lifecycle Management (CLM) software by Sonatype, software security ...  more>>
Monday, February 3, 2014
Teradata, a provider of analytic data platforms, marketing and analytic applications, and related services, has recently received certification for Teradata Cloud Information Security Management System ...  more>>
Tuesday, March 15, 2016
The consumerization of IT and business Bring Your Own Device (BYOD) programs have resulted in potential security problems for IT leaders, according to research firm Gartner....  more>>
Tuesday, February 4, 2014
Adallom, an Israel based SaaS security expert has raised funds of $15mn for boosting its sales force in the U.S. and amending its R&D in Israel. ...  more>>
Wednesday, February 5, 2014
CIOs and CSOs are pursuing their idea of fool-proof network security by ensuring multi-layer authentication, encryption-key management and finer access control....  more>>
Wednesday, February 5, 2014
Splunk, a company that develops real-time Operational Intelligence software, announced that it has developed an app that will stalk the cyber attacker....  more>>
Wednesday, February 5, 2014
The Information Security Company DB Networks integrates intelligence SQL injection protection; IDS-6300 into databases to prevent intelligence security breaches. SQL injection attacks are ...  more>>
Friday, February 7, 2014
As enterprises are adopting cloud applications, the IT department is under tremendous pressure to ensure the security of the corporate data which is residing and travelling on third-party ...  more>>
Monday, February 10, 2014
<<Previous  1   2   4   5   6   7   Next>>