Cloudy thinking: Why concerns about the cloud don’t translate into caution for most firms

By Christian Toon, Risk and Security Specialist at Iron Mountain.

Read More

AWS encryption

SafeNet, Inc. has announced key enhancements to SafeNet ProtectV that allow customers to encrypt Amazon EC2 workloads and maintain full ownership of encryption keys, with no need for on-premise hardware. SafeNet ProtectV with Virtual KeySecure is now available to run entirely on Amazon Web Services (AWS) infrastructure and is compatible with AWS CloudHSM, allowing customers to retain full ownership of their encryption keys while deploying entirely in the cloud. Through the AWS Marketplace,...

Read More

NED appointment signals intent to expand

LEADING business continuity and information security adviser Jermyn Consulting has signalled clear intent to push ahead with expansion plans by appointing one of the UK’s top Non-Executive Directors to its board.

Read More

Thales unveils Cyber Integration & Innovation Centre

Unique facility reinforces Thales’s commitment to improving UK’s cyber security.

Read More

Surge in SQL injection

Traditionally a technique of the most talented hackers, automated SQL attack tools are putting enterprises at greater risk of data breach.

Read More

Dell delivers connected security vision

Four new and updated solutions provide immediate value in protecting the organization, dramatically reducing business risk.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
Alpha Generation Distribution, specialising in proactive security solutions will distribute...
By Chris Marrison, EMEA Technical Director, Infoblox.
More than half of IT security professionals (52 percent) said loss of customer trust and confidence...
Cyber consultants call on businesses to act now, or risk budgets shrinking further in ‘real...
Thales’s Gemalto Identity Verification Suite (IDV) minimizes ID fraud risks by verifying document...
Over two-thirds of surveyed IT professionals believe cloud account takeovers are a significant risk...