Centrify survey finds unmanaged Apple devices are a liability for corporations

Lack of encryption and weak or shared passwords expose sensitive corporate and customer information.

Read More

Intel Security appoints Richard Steranka to lead global partner efforts

Former vice president of Avaya's worldwide partner organisation to bring proactive security to global partner network.

Read More

Jimmy Wales confirmed as opening keynote speaker at IP EXPO Europe 2015

Founder of Wikipedia to discuss his views on Internet privacy and censorship.

Read More

Security specialist strengthens IT team

A Lancashire IT company is adding muscle to its growing team with the appointment of a computer network security expert to help its clients better protect their IT systems.

Read More

Demand for IT security skills grows

Almost half (47%) of UK CIOs and CTOs will add extra IT security personnel to their teams in 2015 as companies spend a fifth of their IT budget on security.

Read More

Put information security ahead of infrastructure security  

By Mark Edge, Country Manager UK, Brainloop.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
LastPass by LogMeIn has published the results of a new study conducted by Vanson Bourne to offer...
Risk-based authentication hinders threat actors while streamlining user experience.
55 percent of UK workers can’t recall receiving cybersecurity training, despite cyber-attacks...
Intel Security, CSIS Survey: Only half of IT staff agree with executives that their cybersecurity...
Trojans were responsible for four out of five infections worldwide.
By Dave Larson, CTO and VP Product at Corero Network Security.