Cyber security spending in critical infrastructure to hit $46 bn

  • Published in

ABI Research sees security spending climbing on the back of a pessimistic outlook on security in the cloud

Read More

Log, log and log some more

  • Published in

Tripwire looks to log files as the best source of security and compliance

Read More

Helping ISVs really monetise

  • Published in

The latest version of SafeNet’s Sentinel Cloud gives software vendors a cloud-delivered service that watches all the pennies they might make, and secures the process as well.

Read More

Cyber security, staff and the cock-up theory

  • Published in

Are main board directors concerned about the US NSA and the PRISM program? Not too much, it appears, and the same goes for attacks by criminals or competitors. The big cyber security problem, a survey shows, comes from the staff.

Read More

Cloud can be the basis of flexible working

  • Published in

Survey sponsored by Vodafone points to significant benefits from more flexible working, and how the technology is making it easier for businesses to put it in place.

Read More

Getting a head start in BYOD

  • Published in

The staff may want to bring their own devices, but if the company is not ready or able to exploit it securely and profitably, it may need help from a company like CompuCom

Read More

Nine out of 10 organisations failing to patch mobile devices for remote workers.
Society’s ever-increasing demands for information and data storage are to be the focus of a...
By James Brown, Director, Cloud Solutions Architecture.
Proact has secured a major contract with the Norwegian Tax Administration. Data centre supplier...
Global technology services provider points to automation and fully-accredited partners as way to...
InfiniGuard delivers significant updates for modern data protection, disaster recovery, and...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more