Archived Articles

Back to Vendor Listings

Security Versus Compliance: What’s the Difference?

Security is the pursuit of perfect protection through ongoing tightening of defenses and preemptive activities to cover vulnerabilities.  Risk management, on the other hand, is a discipline that enables organizations to operate and measurably improve their security and compliance environments according to legal standards. Most companies are not accustomed to thinking of information as a…

Salesforce Under Cyber Attack; Issues Malware Warning

Attackers are targeting Salesforce users with malicious emails designed to trick victims into downloading the Dyreza malware onto their computers, the software-as-a-service giant warned customers earlier this week. Salesforce said it was not aware of any customers who have been affected by the attacks. The attackers have not compromised Salesforce systems. The attacks typically utilize…

5 Strategies to Combat Shadow IT

In today’s businesses, it seems like the technology landscape is changing ever more rapidly. For most firms, IT has become a veritable parade of transformative and disruptive technology: cloud, mobility, BYOD, Internet of Things – new technologies keep coming down the pike that call for new strategies, new technologies, and new processes to keep organizational…

Veritas Capital Agrees to Acquire BeyondTrust for $310 Million

Veritas Capital, the New-York-based private-equity, firm has agreed to buy BeyondTrust Software Inc., a provider of privileged account management and vulnerability management solutions, a statement by the security vendor said. Bloomberg reported that Veritas, which has been an investor in BeyondTrust since 2006, would pay $310 million. A Phoenix-based company, BeyondTrust said it has experienced revenue CAGR of…

IEEE Launches Center for Secure Design with Google, Twitter, Harvard and Others

Google, Twitter, and HP are teaming up with 10 other technology companies and universities to help developers design secure software and write better code. An initiative under the Institute of Electrical and Electronics Engineers (IEEE) Computer Society, the new group focuses on practical recommendations for secure software design. The other founding members of IEEE Center…