UK workforce is ‘doing IT’ for themselves

IT leaders see the value of end user computing strategies but risk and compliance issues prohibit progressive implementation.

Read More

Cloud security best practice

By Andrew Tang at MTI.

Read More

How to implement the US Cybersecurity Framework

The technology that supports and protects an organization’s information is increasingly advanced and connected. It is also increasingly under attack. Earlier this year, the National Institute of Standards and Technology released the US Cybersecurity Framework (CSF) to help critical infrastructure providers. Now, new guidance from ISACA, an association of 115,000 global technology and business professionals, helps organizations of all sizes and in all industries use the CSF.

Read More

IL3 accreditation

Platform securely bridges access between IL2 and IL3 data while providing connectivity to the Public Services Network.

Read More

Security breaches can go undiscovered for weeks

Tripwire, Inc has announced the results of a survey of 215 attendees at the Black Hat USA 2014 security conference in Las Vegas, Nevada.

Read More

Increased demand for web apps hampered by lack of critical penetration

Inevitable growth of web apps leading to innovative new use cases yet many organisations still struggle with security implementation and testing.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
Databarracks has been named as one of the first organisations in the UK to become certified with...
Survey reveals we’re fighting a losing battle against state-sponsored attacks.
CyberArk survey findings show organisations are failing to secure privileged accounts and...
Allied Telesis predicts that management, security and optimization of infrastructures will be the...
Insight research highlights growing importance of IT in the workplace with 8 in 10 business...
Lack of encryption and weak or shared passwords expose sensitive corporate and customer information.