<
>

Government Agencies to use HID goID for Adopting Mobile Citizen IDs

HID Global®, a worldwide leader in trusted identity solutions, announced that its HID goID™ solution has been extended to provide an end-to-end system for deploying...

Ivanti Supply Chain Delivers Powerful Scalability with Avalanche 6.3

Ivanti Supply Chain is enhancing supply chain mobility with the launch of Avalanche 6.3, powered by Wavelink. Designed to meet the increasing demands of supply chain...

Almost Half of Companies Still Can't Detect IoT Device Breaches

Gemalto, the world leader in digital security, can today reveal that only around half (48%) of businesses can detect if any of their IoT devices suffers a breach. This...

VMware-Ready Certification for Trend Micro

Trend Micro Incorporated, a global leader in cybersecurity solutions, announced that its telecom IoT security solution, Virtual Network Function Suite (VNFS), has been...

Akamai To Add Customer Identity Access Management Capability

Akamai Technologies, the intelligent edge platform for securing and delivering digital experiences, has entered into an agreement to acquire Janrain, the company that...

Radware to Acquire ShieldSquare

Radware®, a leading provider of cyber security and application delivery solutions,has entered into a definitive agreement to acquire ShieldSquare®, a market-leading...

Sophos Acquires Avid Secure

Sophos, a global leader in network and endpoint security, has acquired next-generation cloud infrastructure security company, Avid Secure. Avid Secure offers an...

Kaspersky Doubles Down On Enterprise Cybersecurity In Asia

Russian cybersecurity company Kaspersky Lab announced plans to grow its enterprise cybersecurity position in Asia through a partnership with MSI-ECS Philippines,...

Trustwave Unveils New Advanced Secure Email Gateway

Trustwave unveiled Trustwave Secure Email Gateway (SEG) 8.2, the latest iteration of its email security platform that offers organizations a comprehensive solution for...

Disconnect Between Confidence in IT Security Programs and Data Breaches

According to results from a survey Syncsort, the glo

Pages