Read more about RSA Conference 2012
Bookmark and Share
  • Encryption and key management as strategic business issues

    02.03.2012

    Encryption is now viewed as a strategic issue with business leaders gaining greater influence over their organizationís encryption strategy, according to Richard Moulds, the vice president for product management and strategy at Thales e-Security.

  • Identity, app and mobile device monitoring

    02.03.2012

    Lancope unveiled the latest version of its StealthWatch System, which harnesses the power of NetFlow and other flow data from existing infrastructure to cost-effectively deliver end-to-end visibility for vastly improved network and security operations.

  • Trusted Computing Group unveils new membership option

    02.03.2012

    Open industry standards organization Trusted Computing Group announced it has created a new membership option, the Associate, targeted to enterprise users, service providers, and to integrators and resellers.

  • Real-time session monitoring by Cyber-Ark

    02.03.2012

    Cyber-Ark Software announced real-time session monitoring capabilities that enable immediate termination of suspicious activity.

  • Protection for data in the cloud

    02.03.2012

    Fasoo announced three security solutions that enable protection for data in the cloud.




Spotlight

Infosec management strategies and the modern CTO

Posted on 21 January 2015.  |  Brandon Hoffman, Lumeta's CTO, talks about the management strategies that are essential in the information security industry. He also offers advice to those stepping into the CTO role for the first time, and talks about the evolution of network situational awareness.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Jan 23rd
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //