Belden has announced an agreement to purchase cybersecurity leader Tripwire for $710M. Belden is a leader in the high quality, end-to-end signal transmission solutions serving enterprise connectivity, industrial and broadcast markets. They’ve been in business 110 years and have a market cap of $3B.
Read MoreKaspersky Lab has undertaken a master review of the key events that defined the threat landscape in 2014. Among a range of security incidents, targeted attacks and malicious campaigns stand out, particularly in terms of their scale and impact on businesses, governments, public and private institutions.
Read MoreNutanix has announced added security capabilities for its Virtual Computing Platform, including a number of additional certifications and security features, such as data-at-rest encryption. These capabilities augment the company’s Security Development Lifecycle (SecDL), which embeds security into every step of the software development process. Businesses that manage sensitive customer data and business information, such as government agencies and those in healthcare and financial...
Read MoreSenior executives and business decision-makers across Europe say data analytics are important to their companies’ plans across a wide range of activities, from better serving customer needs to creating new products and services, finding opportunities to expand into new markets, increasing sales and revenue, and adding new employees.
Read MoreEnterprise mobility and the proliferation of endpoints are driving profound changes in how organisations handle information governance, according to a Forrester Consulting survey commissioned by Druva. Companies are planning significant increases in governance-related spending, accelerated centralisation of governance programs, greater inclusion of endpoint content in eDiscoverydata collection initiatives, and others measures designed to address concerns over both the volume and the...
Read MoreMcAfee Labs dubs 2014 “Year of shaken trust”; predicts 2015 trends in Internet trust exploits, privacy, mobile, Internet of Things, and cyber espionage.
Read More