State-sponsored attacks: The worst has yet to come

Survey reveals that hacking landscape will get much worse and IT security professionals cannot even confirm whether or not their network has already been breached.

Read More

Majority of organisations not confident in ability to protect data after a breach

74 per cent of IT decision-makers believe perimeter security is effective at keeping out security threats, yet 41 per cent believe unauthorised users are able to access their networks.

Read More

Human resources and training departments key to securing the human

Security awareness training must be given more importance as likelihood of human error leading to a security breach increases.

Read More

Radware appoints Julian McMenamin as Country Manager for Ireland and Scotland

Radware to boost regional presence through McMenamin’s industry experience.

Read More

Dell and Oracle help customers deploy Oracle Business Intelligence Applications

Dell Integrated Systems for Oracle Business Analytics dramatically speeds deployment, management and time to results for mid-sized companies.

Read More

Lack of IT policy on devices putting companies at risk

New research from data recovery specialists, Kroll Ontrack, reveals how companies that don’t regulate employee usage of business devices with effective IT policies are putting data security at risk.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
Akamai Technologies and Trustwave have formed a strategic alliance designed to help businesses more...
Companies still need to get their data security houses in order.
35% of IT professionals acknowledge that insider threat is biggest risk to networks.
New collaboration broadens identity relationship management options for organizations on the...
The year 2015 has become widely referred to as the year of the data breach. What nefarious...
The technology that supports and protects an organization’s information is increasingly...