Security News

Based on a global survey of 727 cloud technology decision makers at businesses with more than 1,000 employees, Forrester Consulting found how shifting business priorities are driving enterprises...

Proofpoint announced the availability of Proofpoint Cloud Account Defense (CAD) to detect and protect Microsoft Office 365 accounts, preventing attackers from causing financial and data loss....

Alcide announced a release of its Cloud Native Security Platform. Alcide’s platform provides granular visibility, control and security for a range of cloud-native environments, including...

GMO GlobalSign announced that Cayan is integrating GlobalSign’s scalable, cloud-based Public Key Infrastructure (PKI) service to improve ease-of-use and reduce the support costs of its Genius...

Siemens and Alibaba Cloud signed a Memorandum of Understanding (MoU) to partner to foster the industrial Internet of Things (IoT) in China. The two companies will leverage each other’s technology...


Usernames, email addresses, and social media tokens for 21 million users breached, with 4.7 million phone numbers scooped up in the process.

An assumption made by many security professionals is that any performance differences between physical security devices are eliminated when those security software images are run on identical...


Outpost24's Bob Egner Talks Application Security, Agile Development, SecDevOpsAs organizations move more data into the cloud, too many are treating security as an afterthought, says Outpost24's...