ChaptersEventsBlog
We're exploring how organizations adapt IAM to AI. Take the AI Identity and Risk Readiness Survey by September 5 →

Announcements

Announcements
Publishing Healthcare App Guidance for Developers
Publishing Healthcare App Guidance for Developers

Information Security Buzz

June 1, 2015

Finally, IoT security gets much-needed attention
Finally, IoT security gets much-needed attention

EET India

May 29, 2015

CIF cloud code of practice gains European Commission backing
CIF cloud code of practice gains European Commission backing

Gizmodo India

May 29, 2015

Initiative to secure smart cities unveiled
Initiative to secure smart cities unveiled

IT Web

May 28, 2015

'Black Cloud'™ darkens the enterprise to all but authorized devices
'Black Cloud'™ darkens the enterprise to all but authorized devices

Government Computer News

May 20, 2015

Top 9 cloud computing threats
Top 9 cloud computing threats

Computerworld Australia

May 19, 2015

How AT&T Is Virtualizing Security
How AT&T Is Virtualizing Security

The CIO Report

May 18, 2015

Oracle Issues VENOM Security Updates
Oracle Issues VENOM Security Updates

SecurityWeek

May 18, 2015

Sony Hack Aftermath: How Hollywood is Getting Tough on Cybersecurity
Sony Hack Aftermath: How Hollywood is Getting Tough on Cybersecurity

Variety

May 14, 2015

Channel Partner Program Roundup: Cirrity, Westell, Carousel Industries
Channel Partner Program Roundup: Cirrity, Westell, Carousel Industries

The VARGuy

May 14, 2015

Cloud Security Alliance, Waverley Labs Collaborate On Open-Source Software-Defined Perimeter Spec
Cloud Security Alliance, Waverley Labs Collaborate On Open-Source Software-Defined Perimeter Spec

Dark Reading

May 13, 2015

THE ROLE OF CLOUD BROKERS IN THE CLOUD
THE ROLE OF CLOUD BROKERS IN THE CLOUD

Backup Technology

May 13, 2015

What will a Majority Conservative Government mean for the Cyber Security and Tech Industry?
What will a Majority Conservative Government mean for the Cyber Security and Tech Industry?

Information Security Buzz

May 12, 2015

Cloud Access Security Broker keeps usage data on-premise as you discover, analyze and secure cloud applications
Cloud Access Security Broker keeps usage data on-premise as you discover, analyze and secure cloud applications

Network World

May 11, 2015

Combating the Notorious Nine with Zero Trust Data Security
Combating the Notorious Nine with Zero Trust Data Security

Cloud Wedge

May 8, 2015

The new perimeter and the rise of IDaaS
The new perimeter and the rise of IDaaS

GCN

May 8, 2015

NIST prepping more cloud security control guidance to complement FedRAMP
NIST prepping more cloud security control guidance to complement FedRAMP

FierceGovernmentIT

May 7, 2015

Top 11 Virtualization Risks Identified
Top 11 Virtualization Risks Identified

Network Computing

May 7, 2015

Cirrity Snags Cisco Master Service Provider Designation as Company Announces Azure Solutions
Cirrity Snags Cisco Master Service Provider Designation as Company Announces Azure Solutions

TMCnet

May 6, 2015

TIC overlay just the beginning for FedRAMP, says Goodrich
TIC overlay just the beginning for FedRAMP, says Goodrich

FierceGovernmentIT

May 6, 2015