Internet of Things Security Foundation set for global launch

A collaborative initiative has been established to respond to rising concerns over security in the Internet of Things. The Internet of Things Security Foundation (IoTSF) will publically launch on September 23rd at the Digital Catapult in London.

Read More

Skills uncertainty, not shortages, is the real issue across Europe, says Claranet  

Partnerships are key to establishing business certainty and insulating against skills shortages.

Read More

AWS Security: What You Need to Know  

Professor Avishai Wool, CTO of security policy management provider AlgoSec, examines some of the key security features of Amazon Web Services and provides tips on best practice.

Read More

HP unveils data-centric security protection enhancements  

New enterprise data security offerings from HP Atalla and HP Security Voltage address collaboration, PCI compliance and scope reduction.

Read More

Gallagher's security solutions chosen for World Trade Center

Gallagher's PIV Solution will be installed for two Federal agencies residing at the World Trade Center. Purpose built for the U.S. Federal market, Gallagher's PIV (Personal Identity Verification) Solution delivers state-of-the-art security architecture with the fastest form of authentication available. The Gallagher PIV Solution offers customers a lower total cost of ownership through an industry-leading hardware warranty, the ability to update end devices remotely, and a fully...

Read More

Shining the light on Shadow IT is critical to understanding unauthorised application usage in the enterprise, says M-Files

Understanding the scale and magnitude of the use of unauthorised applications across the enterprise is the first step in dealing with Shadow IT. This is according to M-Files Corporation, a provider of solutions that dramatically improve how enterprises manage documents and other information.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
Two-year study explores the roles of information security leaders and how they are affected by...
Venafi has released the results of its 2015 RSA Conference survey, gathered from nearly 850 IT...
Research conducted by Endace and VIB identifies the economic, resourcing, and management challenges...
Anomali has published the results of a Ponemon Institute study revealing that 70 percent of...
C-level executives increasingly and proactively targeted by social breaches – correlating to a...
Conficker remains the most active malware family, but malware linked to denial-of-service attacks...