(ISC)2® introduces programme to develop cybersecurity education

Global universities now have access to the largest, most current compendium of information and software security topics.

Read More

Cloud services putting businesses at risk

New report from Skyhigh Networks analyses data from more than a million users to uncover usage and risk trends; Points to a need for greater employee education about data protection and privacy.

Read More

Simplifying Certificate Management, Credentialing

New cloud-based console simplifies management of SSL, PKI, certificate discovery, device certificates and credentialing.

Read More

Authentication – an update

Ian Kilpatrick, chairman Wick Hill Group, looks at the current state of authentication and examines the solutions on offer from two companies in Gartner’s Magic Quadrant

Read More

Delivering a Cloud Compliance Service

Sookasa, Inc. has emerged from stealth mode to radically simplify the protection of sensitive files across popular cloud services and mobile devices. Sookasa is the first company to enable professionals to natively use their favorite cloud services, such as Dropbox and Gmail, and mobile devices, while transparently encrypting sensitive data and addressing regulations such as HIPAA and FERPA.

Read More

European Standardization Organizations discuss role of standards

A high-level delegation from the European Standardization Organizations (ESOs) – CEN, CENELEC and ETSI – met with Neelie Kroes, the Vice-President of the European Commission responsible for the Digital Agenda, in Brussels recently. During this meeting, the representatives from the three ESOs presented their latest proposals regarding how to maximize the positive contribution that standards can make to enhancing internet security and protecting personal data, in order to support the...

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
The Cisco 2014 Annual Security Report reveals that threats designed to take advantage of...
Cyber consultants call on businesses to act now, or risk budgets shrinking further in ‘real...
Think of cyber attacks and the chances are computer hacking will be the first, and possibly only,...
Clavister shifts to fully subscription-based model, making the unique Clavister cybersecurity...
69% of IT professionals are not confident their data would be secure if perimeter defenses were...
According to Atlas VPN estimations, damages caused by cybercrime are expected to reach more than...