BYOD security remains a top business concern
  • Posted on 2nd August 2013 in by Phil Alsop

Desktop-as-a-Service could be the key to overcoming BYOD concerns.

Read More
University of St Andrews department scoops awards
  • Posted on 1st August 2013 in by Phil Alsop

The University of St Andrews IT department has won two awards.

Read More
AlienVault rolls out Open Threat Exchange Reputation Monitor AlertSM Service
  • Posted on 1st August 2013 in by Phil Alsop

Free community-sourced service enables organisations to track & receive alerts on threats facing their network, devices & users.

Read More
Sharp increase in blended, automated attacks
  • Posted on 31st July 2013 in by Phil Alsop

FireHost has announced its Q2 2013 Web application attack statistics, which form part of FireHost’s quarterly Superfecta report. These statistics track the prevalence of four distinct types of cyberattacks that pose the most serious threat to businesses, comprising CSRF, XSS, SQL Injection...

Read More
Improved protection and management in a single integrated platform

Panda Security’s new solution allows admin to set URL filtering time limits, ensure employee...

Read More
Growth in external threats, internal breaches and complexity of security

Findings show internal security issues are increasing despite attempts to curb breaches over past...

Read More
WatchGuard introduces Data Loss Prevention solution for Unified Threat Management

WatchGuard® Technologies has introduced a Data Loss Prevention (DLP) solution for its Unified...

Read More
NHS Wales secures information transfers, meets regulatory demands and enhances patient care

National Health Service of Wales extends use of Ipswitch File Transfer technology from 2,000 third...

Read More
ISACA helps enterprises manage vendors using the COBIT 5 Framework

As enterprises increasingly rely on cloud service providers and other vendors to provide...

Read More
ISACA updates IS Audit and Assurance Standards

ISACA has issued revised Information Systems (IS) Audit and Assurance Standards. The standards,...

Read More
Retailers suffer 2x more SQL injection attacks than other industries

Imperva has released the results of the fourth annual Imperva Web Application Attack Report (WAAR),...

Read More
Employees are number one Cyber-security threat

Companies failing to respond to customer demand for proven cyber-security credentials.

Read More
Data security on the road

By Dave Anderson, senior director, Voltage Security.

Read More

Videos

Micheal McCollough, Senior Vice President of Worldwide Partners & Alliances, Mimecast, discusses his new role at the company, where he will lead the evolution of Mimecast’s Channel and MSP programmes, expand...
Mike DePalma, VP, SMB Business Development, OpenText Cybersecurity, discusses the continuing evolution of cybersecurity alongside rapidly emerging AI solutions - with agentic AI gaining significant momentum -...
Dr. J Metz, SNIA Chair, explains how AI workloads are extraordinarily complex and constrained by issues related to latency, space, power and cooling, memory, and cost and how addressing these problems through...
David Primor, Ph.D., Co-founder and CEO of Cynomi, discusses the launch of ELEVATE, a new partner program purpose-built to drive growth, scalability, and success in the delivery of cybersecurity, compliance,...

Expert Opinions

By Anna Pavlova, Senior Vice President for Strategy, Market Development, and Sustainability, CarbonQuest.
As the streaming landscape evolves, content security through DRM becomes crucial for FAST and AVOD platforms to balance reach with protection.
By Rami Jebara, CTO and Co-Founder at Hyperview.
By Vivek Swaminathan, Director of Products and Solutions, Digital Workplace Solutions, Unisys.