UK users unable to detect phishing

  • Published in

McAfee Labs has released the McAfee Labs Threats Report: August 2014, revealing that phishing continues to be an effective tactic for infiltrating enterprise networks.

Read More

Cisco delivers next wave of Unified Computing innovation

Cisco has introduced significant innovations to its Unified Computing System™ (UCS), delivering a broader and more powerful portfolio of technologies to help customers capitalise on rapidly changing landscapes in business and IT.

Read More

Imperva offers support for Cloudera Enterprise

  • Published in

Imperva Inc. has announced the availability of SecureSphere Support for Cloudera. Imperva’s product portfolio protects applications and data across repositories, including structured, semi-structured, unstructured and cloud. With SecureSphere Support for Cloudera, organizations can mitigate costly non-compliance fines and protect against data breaches as they leverage Big Data deployments to deliver business value.

Read More

Five reasons for including secure workspaces in BYOD deployments

  • Published in

Dell advocates the use of secure enterprise workspaces in BYOD environments to help organisations balance employee expectations, business goals, IT requirements and security needs. Today, a plethora of options exist for providing employees with the software and other enterprise resources needed to do their jobs. A secure workspace, however, is the most effective approach for accommodating employees’ needs for anywhere, anytime access to corporate data and resources while also elevating...

Read More

Use the new EU Data Protection reforms to secure funding for IT security, says Databarracks

  • Published in

The EU is to impose new data protection legislation to ensure better protection of the personal information of all EU citizens. The reforms will come with more severe fines for organisations that suffer data breaches. Peter Groucutt, managing director at Databarracks, claims that this is the tool IT professionals can use to drive-through security changes, as failure to do so will now result in severe repercussions: “Often, the fines imposed on organisations that suffer data breaches are...

Read More

Blue Coat reveals security risks from “One-Day Wonders” websites

Blue Coat Systems, Inc. says that 71 percent of hostnames appeared for just 24 hours. While the majority of these “One-Day Wonders” are the backbone for how Internet content is shared and delivered, the sheer volume provides cover for malicious activity, including communication to infected systems.

Read More

LEADING business continuity and information security adviser Jermyn Consulting has signalled clear...
U.S. security professionals value their personally identifiable information more than twice as...
As part of Camwood’s ‘What’s next?’ campaign looking at the future of IT in...
Global universities now have access to the largest, most current compendium of information and...
Cylance, the company that is using artificial intelligence to proactively prevent advanced...
Exostar has introduced the  Partner Information Manager (PIM), a new, modular solution...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more