dcsimg

From the experts who also bring you:

eWeekLogo
ITBELogo
DeveloperLogo
eSFLogo
ServerwatchLogo
DatamationLogo

LATEST SECURITY NEWS AND ANALYSIS

NewsletterSECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

The Definitive Guide to Secure File Sharing

In the interest of faster workflows and better collaboration, employees are now sharing files containing sensitive or proprietary data more than ever before, both internally and externally. When these files move beyond the enterprise's security perimeter, they become vulnerable to a range …

Securing Your Organization’s Network on a Shoestring

Security is complicated, expensive, and time consuming. Worse, nearly 80% of resource-constrained businesses only deploy antivirus and firewalls while hardly spending on other defenses. To face the evolving threatscape, large enterprises buy, integrate, and deploy multiple products to …

KuppingerCole Leadership Compass for Cloud-based MFA Solutions

KuppingerCole evaluates 12 vendors’ services on a variety of use cases and technical capabilities around cloud-based MFA. The report identifies top solution providers in the market, evaluating each vendor against core functionalities and innovative approaches. It also includes …

Analytics and the AML Paradigm Shift

Financial organizations are deploying artificial intelligence and machine learning in the fight against financial crimes. David Stewart, Director of Pre-Sales for the Global Security Intelligence Practice at SAS, offers tips to help separate fact from market hype when reviewing new data …