BLOG

Software Update: How Do You Know Your Disaster Recovery Plan Works?

By Graham Jarvis, Freelance Business and Technology Journalist, Lead Journalist – Business and Technology, Trudy Darwin Communications.

Read More


NEWS

Supply chain attacks surge

While companies improve defences, almost half of respondents still suffer ransomware attacks and the resulting ransom payments only perpetuate the cycle of vulnerability.

Read More

BLOG

Getting a Return on Cybersecurity Investment: Can Businesses Really Put a Price on Prevention?

Frank Horenberg, Zivver’s Head of IT, and Simon Newman, Co-Founder of Cyber London, do a deep dive on the issue of investment in cybersecurity tools.

Read More

NEWS

Tata Communications joins forces with Palo Alto Networks

A global alliance to empower businesses with robust cyber defence in today's digital era.

Read More

NEWS

SailPoint unveils third annual Horizons of Identity Security report

Organisations with advanced identity security see reduced cyber risk, increased business value and improved productivity.

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more
Fidelis Network Sensors coupled with Netgate TNSR provides easy-to-deploy cloud mirror port for...
Trustwave has released the 2018 Trustwave Global Security Report which reveals the top...
Research from F5 Labs shows region has highest proportion of brute force attacks.
Escalating ransomware and phishing threats demand reinforced cyber defences for financial services.
Protecht ERM’s operational resilience module is now backed up with business continuity planning...
Least effective security measures are password-protected documents, facial recognition, and access...