McAfee Labs™ report previews 2015 developments in exploits and evasion
  • Posted on 10th December 2014 in by Phil Alsop

McAfee Labs dubs 2014 “Year of shaken trust”; predicts 2015 trends in Internet trust exploits, privacy, mobile, Internet of Things, and cyber espionage.

Read More
Advanced 365 offers top tips for ensuring compliance with new EU data security legislation
  • Posted on 10th December 2014 in by Phil Alsop

UK businesses found guilty of breaking new data laws could face fines of up to £780,000.

Read More
Critical data at risk from employees
  • Posted on 10th December 2014 in by Phil Alsop

Despite a growing number of data breaches occurring under the glare of the public spotlight, 71 percent of employees in a new survey report that they have access to data they should not see, and more than half say that this access is frequent or very frequent.

Read More
Difference between knowing about access risk and ability to fix it
  • Posted on 10th December 2014 in by Phil Alsop

97% aware of risk created by misused or stolen credentials, but only 29% confident of organisation’s ability to detect improper access.

Read More
British companies at risk of becoming cyber-dominoes

New research from Radware shows a fifth of companies are now under constant attack.

Read More
Smart connected devices market continues to grow in Western Europe

The smart connected device (SCD) market posted another quarter of growth in Western Europe, driven...

Read More
Germany and the UK - Europe’s tech pioneers

Stephen Georgiadis, Managing Director at international investment bank Altium, comments on the...

Read More
Next-generation firewalls must evolve to remain relevant

By Sean Newman, security strategist, Cisco Security Business Group.

Read More
Blancco awarded Cloud Security Product of the Year

Blancco’s data erasure software recognized as market leading security solution for...

Read More
IT lacks efficiency

TeamQuest has announced the results of their Global IT Management survey with indicators on how IT...

Read More
Delivering key privileged access controls for ISO/IEC standards

New whitepaper guides organisations to address ISO/IEC 27002 security controls with the CyberArk...

Read More
Wave Tech selects Becrypt cyber security solution

Solutions provider chooses Becrypt Protect Suite to secure data and meet National Planning...

Read More
NTT Com Security boosts leadership team in Northern Europe

Company invests in UK, Nordics and Benelux as it moves to trusted advisor and solutions player in...

Read More
Tier-3 builds on strengths in analytics, compliance, automation and incident response

New real-time Governance, Risk and Compliance dashboards deliver live, continuous compliance and...

Read More
Data safety

By Johnny Carpenter, UK Director, iland.

Read More

Videos

Scott Constable, Alliance Director at Vespertec, John Griffith, Worldwide Sales Manager at Midas Immersion Cooling and Dr. George Zhang, Vice President of R&D at Valvoline Global, discuss the three...
Chris Gilmour, CTO of Axians UK, explains how Axians, the ICT brand of VINCI Energies, and Nokia are deepening their strategic collaboration to drive the next phase of communications infrastructure and mobile...
Irvin Shillingford - Regional Manager Northern Europe at Hornetsecurity, discusses the results from the company's annual Ransomware Impact Report, with a rise in ransomware attacks the headline finding. Irvin...
Keith Young, Global Head of Last Mile Services at Arvato, explains how the recent entry into the US data centre market is the latest step in the strategic integration of ATC, the Irish logistics company that...

Expert Opinions

By Vivek Swaminathan, Director of Products and Solutions, Intelligent Data Center at Unisys.
By Shuaib Rabbani, Major Incident Management Product Owner at HaloITSM.
By Jon Fielding, Managing Director, EMEA, Apricorn.
By Orla Daly, Chief Information Officer at Skillsoft.