Capgemini launches Anomalous Behaviour Detection with Pivotal

Unique new offer to detect and react to advanced internal and external business threats.

Read More

Leaving the door open for hackers

Courion asks: how secure are your service accounts? Most don’t realise the number of service accounts that exist within their organisation, frequently with default password settings created during software installation still in place. The problem is, service accounts typically provide privileged access to valuable and confidential data. Because service accounts are not proactively managed, they represent an especially attractive target to a hacker.

Read More

Becrypt announces continued expansion in North America

Leading solutions provider for government information systems chooses Becrypt’s cyber security solutions.

Read More

Central government ambitions to slash ICT costs are hard to fulfil

New research from analyst firm Kable suggests that highly-publicised government targets to slash spending on ICT are proving harder to deliver on than previously expected.

Read More

Risk:Value report reveals majority of UK senior executives expect to suffer a security breach

NTT Com Security research shows company insurance failing to cover for security beaches.

Read More

SecureAuth announces international expansion into Europe

Award-winning authentication provider appoints Bruce Jubb as Director for EMEA.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
HP Wolf Security threat research team sees cybercriminals using legitimate cloud providers to host...
The Information Commissioner’s Office (ICO) has published a report highlighting how...
Cybercriminals leverage Microsoft Office exploits, fileless PowerShell threats, Locky...
Guarding against security threats with a state-of-the-art vulnerability management solution.
Crown Records Management/Censuswide survey of IT decision makers reveals companies are woefully...
Check Point’s “Cyber Attack Trends: 2018 Mid-Year Report” reveals 42% of organizations...