Security Blog

Latest Posts


Image of David Norfolk

29th June, 2015 - IT Security Analyst & CISO Forum 2015
A forum report.

Image of Fran Howarth

5th March, 2015 - Solving the complexities of SAP account and entitlement reviews
Access governance for SAP environments

Image of Fran Howarth

16th February, 2015 - The role of trusted data in security intelligence
To gain actionable insight from data you must be able to trust the data in the first place.

Image of Fran Howarth

4th November, 2014 - LogRhythm's continued momentum
New funding and an IPO in sight.

Image of Fran Howarth

3rd September, 2014 - Major trends and developments in the advanced threat protection market
The key to defence is automation. Yesterday's tools are no longer sufficient.

Image of Fran Howarth

19th August, 2014 - Managing the BYOD risk
BYOD is an unstoppable force. What issues are organisations facing?

Image of Fran Howarth

18th August, 2014 - Hexis Cyber Solutions: a new entrant to the NAC market
New product offerings from Hexis Cyber Solutions

Image of Fran Howarth

26th May, 2014 - What the Bit9 + Carbon Black merger is all about
More consolidation and investment in the advanced threat protection space

Image of Fran Howarth

26th May, 2014 - A brave new (pretty scary) world
The cyber era is upon us and there are many changes we are going to have to make

Image of Fran Howarth

17th March, 2014 - The perils of the privileged insider
Privileged insiders hold the keys to the kingdom and any damage they cause, whether maliciously or inadvertently, can be extremely costly.

Image of Fran Howarth

26th May, 2014 - New standard for simpler, stronger online authentication
The new authentication standard from the FIDO alliance will do much to solve problems related to secure online authentication.

Image of Fran Howarth

28th January, 2014 - DDoS attacks: "the cost of doing business online"
Targeted attacks are on the rise, including a major resurgence in DDoS attacks

Image of Fran Howarth

23rd May, 2014 - Advanced cyber threat detection and response from Hexis Cyber Solutions
Adding intelligence to advanced threat detection and protection

Image of Fran Howarth

28th May, 2014 - NAC technologies morphing into network security platforms
NAC technologies are continuing to evolve and are being repositioned as network security platforms.

Image of Fran Howarth

2nd August, 2013 - Infographic on API adoption
New data reiterates the importance of APIs for enabling the extended enterprise.

Image of Fran Howarth

1st August, 2013 - APIs: a new era in enablement
APIs are the key enablers for efficient collaboration in the extended enterprise

Image of David Norfolk

25th July, 2013 - Heads up! Updated security standard coming....
The ISO 27000 standards are a good basis for an Information Security Management System - and an update is expected this year.

Image of Fran Howarth

24th July, 2013 - Bit9 brings Mac users into the fold
New capabilities built from the ground up specifically for Mac users

Image of Fran Howarth

24th July, 2013 - SailPoint unveils unified identity management as a service suite
On-premise and cloud capabilities seen as equally important

Image of Fran Howarth

18th July, 2013 - Ping Identity receives $44m funding; eyes IPO
This new funding attests to the vitality of the identity management as a service market.