Becrypt extends Enterprise Data Protection strategy with new secure file sharing solution

  • Published in

Becrypt mShare addresses the growing demands and conflicts that data leakage prevention is placing on the more security conscious organisations.

Read More

GFI Software launches GFI LanGuard 2014

  • Published in

To meet increasing threat levels, GFI expands GFI LanGuard’s vulnerability assessment capabilities to include mobile operating systems, Linux distributions, and even more third-party applications.

Read More

ISACA releases “Configuration Management: Using COBIT 5” to help businesses manage change

  • Published in

Change can cause business disruptions, inefficiencies and financial losses. Proper configuration management (CM) reduces the risk of malfunctions and increases efficiency during times of IT-related change. To help enterprises implement effective CM, global IT association ISACA has released a new guide, Configuration Management: Using COBIT 5.

Read More

100% of commuters put company data at risk over free public Wi-FI

  • Published in

Commuter study reveals commuters regularly connect to free, unsecure Wi-Fi services during their daily journey, putting personal and company data at risk every week.

Read More

Virtual Panda thrives in the cold

  • Published in

Logistics provider Peter Green Chilled offer Temperature Controlled services to the food industry supplying to the major retailers – including Tesco, Asda and Sainsbury's.

Read More

Allianz partners with forensic IT experts

  • Published in

Cyber crime is costing the UK economy £27bn.

Read More

2N, the global intercoms leader, forecasts that COVID-19 and security concerns will lead to...
Identity leaders combine developer and enterprise expertise, offering customers more flexibility.
New research from Tanium suggests UK firms have a long way to go in building the business...
Cybersecurity remains a top priority for SMBs worldwide, as revealed in a survey conducted by...
Kaspersky Lab reveals latest cyberespionage tactics: complexity and modularity vs functionality.
NETSCOUT SYSTEMS has released its 13th Annual Arbor Worldwide Infrastructure Security...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more