Chief Security Officers reveal true cost of breaches

On 10th anniversary of report, classic attack vectors re-emerge; Cisco reduces “Time to Detection” to six hours.

Read More

NEWS

Passwords - a thing of the past?

Passwords and two-factor authentication are going to decrease as organisations adopt modern methods to authenticate users.

Read More

Law firms break cybercrime silence

Databarracks, a provider of award winning business continuity services, and Zerto, a leading provider of IT resilience solutions, has published the findings from a legal industry IT roundtable on the challenges of cloud and dangers of cybercrime.

Read More

Confidential information at greatest risk in new businesses

Bad information management practices leave fledgling business over exposed to risk.

Read More

Beware innovation and IoT threat

Arbor Networks has released its 12th Annual Worldwide Infrastructure Security Report (WISR) offering direct insights from network and security professionals at the world’s leading service provider, cloud/hosting and enterprise organisations. The report covers a comprehensive range of issues from threat detection and incident response to managed services, staffing and budgets. Its focus is on the operational challenges internet operators face daily from network-based...

Read More

Pulsant strengthens cyber security solutions

Pulsant, UK provider of hybrid cloud services, is now a Cyber Essentials Certifying Body, licensed to certify for both the Cyber Essentials Scheme and the IASME governance standard. 

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
Nearly four-in-ten data breaches are caused by stressed, tired employees.
Cloud adoption will continue to rise next year as concerns over security remain.
Gemalto has announced the availability of its SafeNet ProtectV solution on the Azure Marketplace,...
Around 60% of BYOD workers do not involve their company IT support in setting up their devices
Self service tool empowers the end user with multi-access self-service password management.
Report provides five-year threat retrospective, GPU malware assessment, and techniques for...