Some telcos are investing in deception technology. According to Attivo Networks, one telco customer found enough unauthorized and malicious behaviour by employees to warrant firing them on the spot. There are telecom infrastructure use cases too.
T-Systems wants to become Europe's largest provider of cyber security services. This HardenStance Briefing looks at how growing market share in the UK is key to achieving that goal.
The U.S. District Court for the Northern District of California has dismissed the NSS Labs Anti Trust lawsuit against AMTSO. Thank goodness.
The NSS Labs apology to CrowdStrike and resolution of their lawsuits is progress as far as it goes. But it still leaves outstanding the NSS antitrust suit against AMTSO.
After almost twenty years competing with Check Point, Fortinet today announced higher quarterly sales than its long-time rival for the first time.
It's clear from the proof-points offered up in a recent webcast that IBM Security and Cisco are serious about their cyber security alliance. In the near future, though, the partners will disrupt the cyber security market at the margins rather than transforming it.
Orange Polska can point to three clear examples of how SecBI's Autonomous Investigation software has detected threats that other security controls missed.
With Reuters disclosing that Dell is exploring a sale of Secureworks, who's the right buyer for one of the true leaders in cyber security?
Akamai is gaining traction with its enterprise security strategy but faces a number of challenges in seeking to outperform its achievements in cloud security.
Coming out of its global analyst event in New Jersey, it's clear that Nokia needs to further develop its security strategy to support its drive into enterprise networking.
Now that Palo Alto Networks has joined, there are two focused security vendors in the Next Generation Mobile Network (NGMN) Alliance. Other security vendors should consider joining too.
Red Hat has a substantial portfolio of security features for container environments. These are designed to protect both the application and the underlying infrastructure.