BYOD security remains a top business concern

Desktop-as-a-Service could be the key to overcoming BYOD concerns.

Read More

University of St Andrews department scoops awards

The University of St Andrews IT department has won two awards.

Read More

AlienVault rolls out Open Threat Exchange Reputation Monitor AlertSM Service

Free community-sourced service enables organisations to track & receive alerts on threats facing their network, devices & users.

Read More

Sharp increase in blended, automated attacks

FireHost has announced its Q2 2013 Web application attack statistics, which form part of FireHost’s quarterly Superfecta report. These statistics track the prevalence of four distinct types of cyberattacks that pose the most serious threat to businesses, comprising CSRF, XSS, SQL Injection and Directory Traversal.

Read More

Improved protection and management in a single integrated platform

Panda Security’s new solution allows admin to set URL filtering time limits, ensure employee productivity while allowing non-work browsing outside work hours.

Read More

Growth in external threats, internal breaches and complexity of security

Findings show internal security issues are increasing despite attempts to curb breaches over past 12 months; growing complexity of security estates highlighted as a significant risk.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
Venafi Risk Assessment team study finds that enterprises average one root access orphan key on...
transport company’s comparative analysis promotes security and encourages dialogue between IT...
The security software market is undergoing a dramatic transformation due to four key developments,...
The year ahead will see other industries and disciplines adopt software development technology and...
A recent survey by app security specialist Promon has revealed that mobile users are massively...
Research provides insights into cyber attacks that abuse hijacked privileged credentials to...