NEWS

Security concerns hold back Cloud adoption

Findings show that security concerns are a major concern for the majority of businesses considering adopting cloud services.

Read More

Security concerns over convergence of personal and workplace identities

90% of IT professionals are concerned about employees using their personal credentials for work purposes.

Read More

Industry leader evaluates growth of cryptographic keys and certificates

Venafi has published the results of a study conducted by Dimensional Research. The study evaluated current and projected growth rates of cryptographic keys and digital certificates in the enterprise for 2016 and 2017. Study respondents included 505 IT professionals that manage these critical cryptographic assets in the U.S., U.K., France and Germany.

Read More

BLOG

Beware email, social media and mobile apps!

As 2016 draws to a close, researchers from Proofpoint have gazed into their crystal ball and predicted what may lie ahead in 2017.

Read More

NEWS

2017 infosecurity predictions

  With cyber attacks ranging from Yahoo! to the Democratic National Committee and the rise of ransomware to the Shadow Brokers, 2016 was an exciting year for the cyber security community, according to RiskIQ.

Read More

UK organisations paralysed by cyber security landscape need to get fundamentals right first

Research reveals UK organisations overwhelmingly using unsupported IT systems.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
Research from Netacea reveals businesses don’t understand up to half of the traffic on their...
HCL Technologies has opened its first European Cybersecurity Fusion Center (CSFC) in Gothenburg,...
Security challenges can only be met with a steadfast commitment to improving cyber security...
Vendor risk visibility and continuous third-party monitoring remains concerningly low despite...
Top three vectors used to exfiltrate data are database leaks, cloud applications and removable USB...
More than two-thirds (67 per cent) of organisations admit that unauthorised cloud applications are...