How to implement the US Cybersecurity Framework

The technology that supports and protects an organization’s information is increasingly advanced and connected. It is also increasingly under attack. Earlier this year, the National Institute of Standards and Technology released the US Cybersecurity Framework (CSF) to help critical infrastructure providers. Now, new guidance from ISACA, an association of 115,000 global technology and business professionals, helps organizations of all sizes and in all industries use the CSF.

Read More

Security breaches can go undiscovered for weeks

Tripwire, Inc has announced the results of a survey of 215 attendees at the Black Hat USA 2014 security conference in Las Vegas, Nevada.

Read More

Increased demand for web apps hampered by lack of critical penetration

Inevitable growth of web apps leading to innovative new use cases yet many organisations still struggle with security implementation and testing.

Read More

IT professionals lack confidence to manage governance, risk and compliance

Dell Software survey shows nearly 100 percent of respondents in finance, retail and healthcare industries are worried about capability to meet compliance objectives.

Read More

Network monitoring solution heals network ailments at The Cambridge School of Clinical Medicine

The School of Clinical Medicine will implement WhatsUp Gold network monitoring solution from Ipswitch to monitor its expanding IT infrastructure. The school is one of six based across the Cambridge University campus and is linked to Addenbrooke’s teaching hospital.

Read More

Lancope appoints Software Development expert Phillip McDonald as Vice President of Engineering

McDonald to leverage over 25 years of proven software engineering expertise to lead a highly efficient, agile-based development team.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
Real-time console details social media threats, risk trends and security effectiveness for...
New Tessian report reveals how two million emails, flagged as malicious, bypassed traditional email...
Just 3% of organizations have real-time visibility into runtime vulnerabilities, as multicloud...
Centrify encourages businesses to increase their Identity and Access Management maturity to...
By Vitali Kremez, Director of Research, Flashpoint.
According to IDC's Europe, Middle East and Africa Quarterly Security Appliance Tracker, 3Q12...