Security Blog

Latest Posts


Fran Howarth

3rd February, 2016 - Bit9 + Carbon Black emerges as Carbon Black
Bit9 + Carbon Black rebrands itself as Carbon Black

David Norfolk

29th June, 2015 - IT Security Analyst & CISO Forum 2015
A forum report.

Fran Howarth

5th March, 2015 - Solving the complexities of SAP account and entitlement reviews
Access governance for SAP environments

Fran Howarth

16th February, 2015 - The role of trusted data in security intelligence
To gain actionable insight from data you must be able to trust the data in the first place.

Fran Howarth

4th November, 2014 - LogRhythm's continued momentum
New funding and an IPO in sight.

Fran Howarth

3rd September, 2014 - Major trends and developments in the advanced threat protection market
The key to defence is automation. Yesterday's tools are no longer sufficient.

Fran Howarth

19th August, 2014 - Managing the BYOD risk
BYOD is an unstoppable force. What issues are organisations facing?

Fran Howarth

18th August, 2014 - Hexis Cyber Solutions: a new entrant to the NAC market
New product offerings from Hexis Cyber Solutions

Fran Howarth

26th May, 2014 - What the Bit9 + Carbon Black merger is all about
More consolidation and investment in the advanced threat protection space

Fran Howarth

26th May, 2014 - A brave new (pretty scary) world
The cyber era is upon us and there are many changes we are going to have to make

Fran Howarth

17th March, 2014 - The perils of the privileged insider
Privileged insiders hold the keys to the kingdom and any damage they cause, whether maliciously or inadvertently, can be extremely costly.

Fran Howarth

26th May, 2014 - New standard for simpler, stronger online authentication
The new authentication standard from the FIDO alliance will do much to solve problems related to secure online authentication.

Fran Howarth

28th January, 2014 - DDoS attacks: "the cost of doing business online"
Targeted attacks are on the rise, including a major resurgence in DDoS attacks

Fran Howarth

23rd May, 2014 - Advanced cyber threat detection and response from Hexis Cyber Solutions
Adding intelligence to advanced threat detection and protection

Fran Howarth

28th May, 2014 - NAC technologies morphing into network security platforms
NAC technologies are continuing to evolve and are being repositioned as network security platforms.

Fran Howarth

2nd August, 2013 - Infographic on API adoption
New data reiterates the importance of APIs for enabling the extended enterprise.

Fran Howarth

1st August, 2013 - APIs: a new era in enablement
APIs are the key enablers for efficient collaboration in the extended enterprise

David Norfolk

25th July, 2013 - Heads up! Updated security standard coming....
The ISO 27000 standards are a good basis for an Information Security Management System - and an update is expected this year.

Fran Howarth

24th July, 2013 - SailPoint unveils unified identity management as a service suite
On-premise and cloud capabilities seen as equally important

Fran Howarth

24th July, 2013 - Bit9 brings Mac users into the fold
New capabilities built from the ground up specifically for Mac users