NEWS
Global cybersecurity report reveals misaligned incentives
  • Posted on 2nd March 2017 in by Phil Alsop

Intel Security, CSIS Survey: Only half of IT staff agree with executives that their cybersecurity strategies have been implemented.

Read More
Hackers only need 24 hours
  • Posted on 24th February 2017 in by Phil Alsop

More than three-quarters (88%) of hackers can break through cybersecurity defences and into the systems they target within 12 hours, while 81% say they can identify and take valuable data within another 12 hours, even though the breach may not be discovered for hundreds of days, according to...

Read More
NEWS
Predicting people - the future of security
  • Posted on 22nd February 2017 in by Phil Alsop

Nearly 80 percent of cyber professionals say enterprises must understand behaviors and intent as people interact with critical data and IP; today, less than a third are able to do so effectively.

Read More
Tenable expands partner Ecosystem
  • Posted on 15th February 2017 in by Phil Alsop

Tenable.io brings automated exchange of vulnerability data with CyberArk, ForeScout and other launch partners .

Read More
NEWS
IT departments find it hard to keep the Cloud safe

Trust now outnumbers distrust for public clouds by more than 2-to-1.

Read More
RSA launches Risk & Cybersecurity Practice

RSA, a Dell Technologies business, has launched the RSA Risk & Cybersecurity Practice that...

Read More
Forcepoint launches new businesses

Global cybersecurity leader Forcepoint has established four market-centric business units....

Read More
Cloud and security top the CIO agenda for 2017

Getronics Mid-Market Reality Check report reveals IT investment priorities for year ahead.

Read More
NEWS
Cyber security readiness study finds widespread shortcomings

International study of 3,000 businesses shows widespread variations in cyber security readiness.

Read More
NEWS
IoT boom and GDPR raise the stakes of a cyber-security breach

Firms need to work smarter rather than harder as the General Data Protection Regulation (GDPR)...

Read More
Hyper-realistic cybersecurity training and simulation centre for Japan

Ni Cybersecurity brings world-leading Cyberbit Range platform to Japan to address the growing...

Read More
Chief Security Officers reveal true cost of breaches

On 10th anniversary of report, classic attack vectors re-emerge; Cisco reduces “Time to...

Read More
Law firms break cybercrime silence

Databarracks, a provider of award winning business continuity services,...

Read More
Confidential information at greatest risk in new businesses

Bad information management practices leave fledgling business over exposed to risk.

Read More
Beware innovation and IoT threat

Arbor Networks has released its 12th Annual Worldwide Infrastructure Security Report...

Read More

Videos

Trustmarque, a leading technology services partner, and Ultima Business Solutions, a specialist in managed services and automation, have completed their merger. Simon Williams, CEO of the new group explains...
Eric Herzog, Chief Marketing Officer at Infinidat, outlines how and why Infinidat has seen outstanding success with the launch of the InfiniBox® G4 Family, creating a new foundation for the future with...
Rebecca Scottorn, Partner at L.E.K. Consulting and part of the global Industrials Practice, discusses the company’s recent ‘State of the Energy Industry’ report, providing valuable insights into a range...
Jim Lippie, Chief Product Officer, Kaseya, discusses the recent Kaseya DattoCon 2025 conference, where the company unveiled its latest innovations and previewed its next generation cyber resilience and digital...

Expert Opinions

By David Davies, Associate Director at Arup.
By Luca Rizzo, Segment Manager at ABB Motion High Power.
By David Trossell, CEO and CTO of Bridgeworks.
By Orla Daly, Chief Information Officer at Skillsoft.