ISACA releases “Configuration Management: Using COBIT 5” to help businesses manage change

Change can cause business disruptions, inefficiencies and financial losses. Proper configuration management (CM) reduces the risk of malfunctions and increases efficiency during times of IT-related change. To help enterprises implement effective CM, global IT association ISACA has released a new guide, Configuration Management: Using COBIT 5.

Read More

100% of commuters put company data at risk over free public Wi-FI

Commuter study reveals commuters regularly connect to free, unsecure Wi-Fi services during their daily journey, putting personal and company data at risk every week.

Read More

Virtual Panda thrives in the cold

Logistics provider Peter Green Chilled offer Temperature Controlled services to the food industry supplying to the major retailers – including Tesco, Asda and Sainsbury's.

Read More

Allianz partners with forensic IT experts

Cyber crime is costing the UK economy £27bn.

Read More

Lieberman Software and Qualys integration

Lieberman Software Corporation and Qualys, Inc. have announced the integration between Enterprise Random Password Manager (ERPM) and the QualysGuard Security and Compliance Suite, providing customers with secure password management for authenticated scanning for IT security and compliance. Lieberman Software will exhibit this functionality at Qualys Security Conference 2013 in Las Vegas this week.

Read More

Passive Vulnerability Scanner now available

Drop-in solution identifies security and compliance violations in BYOD, cloud, and Virtual Infrastructure.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
By Robert Doswell, managing director of Tools4ever UK, a global provider of identity and access...
A new survey of enterprise IT security leaders showed an overwhelming majority--almost 80...
Gemalto has released the latest findings of the Breach Level Index, a global database of public...
C-level executives increasingly and proactively targeted by social breaches – correlating to a...
Despite the perception they are too small to target, SMBs are increasingly vulnerable due to...
With 2018 on the horizon, experts are readily analysing and making predictions about the types...