Security News







2015-06-04 15:58
Bomgar and Thycotic have partnered to provide enterprises with better control and visibility of access to critical endpoints and privileged accounts. Bomgar Privileged Access Management enables sec...

2015-06-04 15:15
In the last few years, Pedram Hayati, founder of Australian IT company Security Dimension, has been developing a custom honeypot intelligence system called Smart Honeypot. Honeypots - fake systems...

