NEWS

Remote working poses significant security risk to UK’s businesses

  • Published in

A third of UK businesses have suffered a data breach because of remote working in the last 12 months, CybSafe study reveals.

Read More

NEWS

Regulation is the only way to control the IoT cyber-security threat

  • Published in

Without regulation, the IoT security threat will continue to grow in 2019.

Read More

NEWS

Cyber awareness on the up but businesses leaving doors open for attackers

  • Published in

Nearly half of office workers have been afforded unfettered access to sensitive company data.

Read More

NEWS

Keeping client data safe on mobile devices

  • Published in

Montagu Evans has selected MobileIron unified endpoint management (UEM) cloud solution, including MobileIron Access and MobileIron Threat Defense.

Read More

NEWS

Virtual CISO helps cover the skills gap

  • Published in

Cylance Inc. has introduced its virtual chief information security officer (vCISO) service, a program designed to provide organisations with critical technology and security resources that support next-generation security architectures and offer robust staff augmentation.

Read More

VIDEO

F5 Labs 2018 Phishing & Fraud Report

  • Published in

A preview of F5 Labs 2018 Phishing & Fraud Report.

Read More

45.6% of European organisations’ assets are ageing or obsolete – compared with 12% in 2017 –...
According to a new global survey from CyberArk, 50 percent of organizations believe attackers can...
Cloud adoption will continue to rise next year as concerns over security remain.
SolarWinds says that SolarWinds® Endpoint Detection and Response (EDR) is now fully integrated...
Growth in worldwide cloud-based security services will remain strong, reaching $5.9 billion in...
Fujitsu expects both businesses and individuals to be targeted, based on issues that impact a wide...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more