• The moving target

    Written by

    The advent of mobility and its infiltration on enterprise has birthed a whole new type of security risk, and as a result presented b...

  • Next gen security

    Written by

    Firewalls are no longer what they used to be – and despite the fact they are low on the adoption scale at the moment, there is onl...

  • A new era

    Written by

    With the advent of the BYOD phenomenon, the amount of threats businesses face have multiplied on an unprecedented scale. Ben Rossi l...

  • Achieving maturity

    Written by

    As the governance, risk and compliance (GRC) market matures, users are struggling to make the case for GRC implementations. What is ...

  • Virtually secure

    Written by

    Difficulties have arisen this year in the area of intrusion prevention systems (IPS). Vendors have struggled to recast their applian...

  • Working to be stronger

    Written by

    Many companies in the Middle East are missing out by not gaining valuable intelligence from threats. Security information and event ...

  • Extending identity

    Written by

    The focal point of enterprise security has long been on fighting malware and outsider threats, while most of the breaches these days...