IT professionals report a lack of high confidence in preventing cyber attacks
  • Posted on 16th September 2014 in by Phil Alsop

Companies still need to get their data security houses in order.

Read More
Rapid7 helps organisations implement stronger security
  • Posted on 16th September 2014 in by Phil Alsop

Rapid7 has announced enhancements to its critical security controls monitoring platform, Rapid7 ControlsInsight, to support Windows server controls and monitoring. Application and maintenance of security controls has been highlighted as a proven and effective means for organizations to proactively...

Read More
GPEN and ICO report finds lack of mobile site optimisation is putting user privacy at risk
  • Posted on 16th September 2014 in by Phil Alsop

The Global Enforcement Network (GPEN) and the Information Commissioner’s Office (ICO) have revealed the findings of their report – conducted by 26 privacy regulators across the world – on the privacy of mobile apps. It found that out of the 1,200 mobile apps analysed, 43 percent...

Read More
IoT security must be fixed for the long term says Beecham Report
  • Posted on 15th September 2014 in by Phil Alsop

New study from Beecham Research underlines how security needs urgent attention if the IoT is to succeed.

Read More
Ipswitch MOVEitTM 8.1 managed file transfer system enhances enterprise security

Integration with security and business continuity solutions allows IT teams to streamline routine...

Read More
Rapid7 launches Global Strategic Services Practice

New programme will help transform the security posture of organisations through threat-focused...

Read More
SMBs divided by the digital revolution

Lack of digital skills affects a third of SMBs in the UK as new ‘free-to-all’ learning...

Read More
Clarifying two-factor authentication

By Toyin Adelakun, a VP at Sestus.

Read More
iomart Group plc selects Arbor Networks’ Peakflow® SP Platform

iomart Group plc, one of Europe’s leading providers of complex managed and cloud hosting...

Read More
Juniper Networks expands Spotlight Secure

Juniper Networks has announced new advancements in its security capabilities that extend the...

Read More
Centrify powers Samsung KNOX Enterprise Mobility Management solution

Centrify Corporation has expanded its strategic OEM partnership with Samsung Electronics Co., Ltd....

Read More
Trustworthy Software Initiative to be based at WMG's Cyber Security Centre

WMG's Cyber Security Centre at the University of Warwick is to host a million pound programme...

Read More
King’s College Hospital uses Netwrix Auditor to secure ICT network

Netwrix helps London hospital to improve security of 10,000-plus user network and provide full...

Read More
‘X-Ray’ vision into firewall configurations and network traffic

Newest enhancement to WatchGuard Dimension visibility solution allows admins to see policy...

Read More
Intel unveils new developer tools for future technologies

Intel Corporation CEO Brian Krzanich kicked off Intel's annual technical conference with a...

Read More

Videos

Eric Herzog, Chief Marketing Officer at Infinidat, explains how enterprises should be thinking about their cyber security strategy today, the difference between the next-generation and traditional approaches...
Eric Herzog, Chief Marketing Officer at Infinidat, discusses next-generation data protection and recovery-first cyber resilience and threat detection strategies; the AI opportunity – How the right storage is...
Steve Wilson, Chief AI and Product Officer at Exabeam, discusses the company’s recent report, From Hype to Help: How AI Is (Really) Transforming Cybersecurity in 2025, explaining that there’s no shortage...
Eric Herzog, Chief Marketing Officer at Infinidat, explains how storage can improve an enterprise’s environmental footprint.

Expert Opinions

By Hans Nipshagen, Vice President Channel at nLighten.
Q&A with Mark Scrivens, FPT Software UK Chief Executive Officer, FPT Corporation.
By Barley Laing, the UK Managing Director at Melissa.