Logo

MTI bolsters security offering with EnCase

  • Published in

Guidance Software brings digital investigation capabilities to the MTI Security Practice.

Read More

ISACA outlines five principles for effective information and technology governance

  • Published in

In new guidance issued today, global IT association ISACA outlines five principles organizations can use to effectively govern and manage their information and technology.

Read More

At least one in three ex-employees left with access to systems or data post termination

  • Published in

Over a third (36%) of desk-based workers in the UK and the US are aware of having continued access to a former employer’s systems or data, with nearly one in 10 actually accessing it.

Read More

Splunk for enterprise security

  • Published in

Splunk Inc. has announced the general availability of version 3.1 of the Splunk® App for Enterprise Security.

Read More

New research showing major changes in the market to be presented at the Managed Services & Hosting Summit 2014

New sponsors announced including: Datto, NaviSite, Claranet, Modern Office, QLogic, Virtual Instruments, Webroot and Aurora Kendrik James.

Read More

DeltaCredit selects Boldon James Classifier to secure information assets

  • Published in

Boldon James delivers data classification to drive DLP solution and prevent data loss incidents.

Read More

Company raises $38.25M to fuel explosive growth as enterprises race to protect themselves.
Intel Security report shows majority of IT budgets will focus on cloud, indicates need for...
Research reveals that companies investing in the latest cyber security products and services are...
By Johnny Carpenter, UK Director, iland.
Delivers industry’s first visibility solution that includes stateful SSL decryption to...
ISACA’s COBIT 5 is included as an informative reference in the core of the US Cybersecurity...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more