Welcome to the new security blog, a group effort from the analyst security team at Bloor.
This new funding attests to the vitality of the identity management as a service market.
When responding to a malware threat costs more than the threat itself...
Newly acquired capabilities will aid RSA in its vision of intelligence-driven security
This new service is simple to use and highly secure, based on elliptic curve cryptography.
The new mantra today is that it is not if your organisation will suffer a security breach, but when. In a recent survey released during Infosec...
To better manage risk, the role of the CISO needs to be moved out from under the CIO and should report directly to the board
One of today's buzzwords is big data. Volumes of information generated are increasing rapidly, driven in part by increased take up of mobile...
The threats we face today are no longer smash-and-grab raids, looking for instant gain. Rather, perpetrators are looking to get a deep foothold into...
The technology landscape is changing fast, bringing much disruptive change that provides organisations with new ways to streamline their businesses,...
Among the many challenges that telecommunications providers face are the need to transform and consolidate their businesses. They need to adopt new...