Wave Tech selects Becrypt cyber security solution

Solutions provider chooses Becrypt Protect Suite to secure data and meet National Planning Corporation (NPC) security standards.

Read More

NTT Com Security boosts leadership team in Northern Europe

Company invests in UK, Nordics and Benelux as it moves to trusted advisor and solutions player in information security and risk management.

Read More

Tier-3 builds on strengths in analytics, compliance, automation and incident response

New real-time Governance, Risk and Compliance dashboards deliver live, continuous compliance and security status view for business stakeholders.

Read More

Data safety

By Johnny Carpenter, UK Director, iland.

Read More

76 per cent of UK IT pros rank their security above average

SolarWinds has released the results of its Information Security Confidence Survey, which explored IT professionals' confidence in their organisations' security measures and processes. The survey found that while confidence is notably high, likely the result of several key factors, widespread adherence to security best practices is lacking and significant, damaging attacks continue, potentially indicating this confidence is a false sense of security.

Read More

Verizon identifies key enterprise technology trends for 2015

Strategic network investments will be a major focus point for savvy CIOs in 2015, as companies seek to make sense of big data, transition to the cloud and monetize the Internet of Things (IoT), according to Verizon Enterprise Solutions’ list of top enterprise technology trends for 2015. In the coming year, enterprise organizations will also adopt technologies that drive business innovation and provide a strong platform for future growth.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
Unique new offer to detect and react to advanced internal and external business threats.
The results of the 10th Annual Market Pulse Survey fromSailPoint Technologies Holdings expose an...
As Internet-connected devices increase in popularity at home and work, consumers express mixed...
The technology that supports and protects an organization’s information is increasingly...
IT leaders prioritise Identity Governance for greater visibility.
Least privilege model reduces security risk and supports overhead for a top 20 university.