All Posts (2199)

Sort by

While the proliferation of the BYOD trend has been bonus for businesses in terms of cost savings to productivity gains. But for IT departments, security and compliance is a headache as they scramble to catch with the mobility requirements of workfor

Read more…

Top 10 Metrics for your Vulnerability Management Program

Security Metrics are essential for quantitative measurement of any security program. Below, we’ve listed some security metrics (in no particular order) which can be used to measure the performance of your Vulnerability Management (VM) program. For d

Read more…

What will you learn:

  • Overview of data leakages
    • Cases
    • Risks
    • Solutions
  • Protection against data leakages
    • Main challenges
    • Sources of data leakages
    • Tools and solutions
  • Data Leakage Prevention systems
    • Core principles and technologies involved
  • Layere
Read more…

50 Emerging IT Security Vendors To Look Out For In 2017

We have completed our selection of the final list of 50 emerging IT Security Vendors to look out for in 2017 from the 1500+ Vendors globally. Believe me this was not easy & we don’t claim this is exhaustive list as it probably will never be as we mi

Read more…