1H2019 Identity Management Funding Analysis

1H2019 Identity Management Funding Analysis

As the first half of 2019 has been and gone, I've taken a quick look at the funding rounds that have taken place so far this year, within the identity and access ...

Cybersecurity ROI:  An Oxymoron?

Return on investment: is it worth the money? That is the central question both government and industry in deciding on any procurement. Demonstrating ROI on cybersecurity products is notoriously difficult and is ...
Cybersecurity KPIs Enterprises Need to Stay Secure

TEST: The 4 Cybersecurity KPIs Enterprises Need to Stay Secure This Year

When it comes to cybersecurity, you can’t rely on brand promises. Many people associate the cost of a product or service with the benefit it brings—i.e. “assumed efficacy” or added security value ...
Security Boulevard

How Much Can Application Isolation Save Your Organization?

How many times a day do each of your users click on a link to an unknown website? Or open an email attachment from an external sender? Bromium’s new risk assessment calculator ...

Bromium Customers Praise Fast, Easy Deployment

“Easy to deploy and easy to use!” Every software vendor seems to use this slogan to assure prospects that once they purchase the license, the rest of the journey is going to ...
Hidden Costs of Cybersecurity Detection Really Add Up

Research Uncovers the Hidden Costs of Detection-based Cybersecurity [Infographic]

Our new research conducted by Vanson Bourne finds detect-to-protect security costs organizations more than $16 million per year. This is despite the fact that detection-based cybersecurity is failing to keep up with ...
Create Trusted IoT, become the King of Sweden?

Create Trusted IoT, become the King of Sweden?

Internet of Things (IoT) devices continue to become more and more prevalent in our daily lives. Alexa gives us the daily news, smart agricultural sensors help farmers optimize yield, and connected sensors ...