Centrify survey finds unmanaged Apple devices are a liability for corporations

Lack of encryption and weak or shared passwords expose sensitive corporate and customer information.

Read More

Intel Security appoints Richard Steranka to lead global partner efforts

Former vice president of Avaya's worldwide partner organisation to bring proactive security to global partner network.

Read More

Jimmy Wales confirmed as opening keynote speaker at IP EXPO Europe 2015

Founder of Wikipedia to discuss his views on Internet privacy and censorship.

Read More

Security specialist strengthens IT team

A Lancashire IT company is adding muscle to its growing team with the appointment of a computer network security expert to help its clients better protect their IT systems.

Read More

Demand for IT security skills grows

Almost half (47%) of UK CIOs and CTOs will add extra IT security personnel to their teams in 2015 as companies spend a fifth of their IT budget on security.

Read More

Put information security ahead of infrastructure security  

By Mark Edge, Country Manager UK, Brainloop.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
Ground-breaking study, commissioned by Bromium, highlights emergence of Platform Criminality,...
Skyscape Cloud Services Limited has successfully achieved certification for the Government’s...
Shadow IT and a lack of business continuity planning present growing threats.
Michael Fimin, CEO of Netwrix shares his list of top security trends for 2015.
Bromium®, Inc. has appointed Bob Maus as senior vice president, business development at...
PowerBroker Management Suite 4.0 adds greater depth to auditing, uncovers potential risks in...