NEWS

Smartphones to replace traditional access cards

  • Published in

In 2016, less than 5 per cent of organisations used smartphones to enable access to offices and other premises. By 2020, Gartner, Inc. said that 20 per cent of organisations will use smartphones in place of traditional physical access cards.

Read More

NEWS

Bad password habits “like leaving the front door open”

  • Published in

Internet users across the globe are yet to master how to use passwords effectively to protect themselves online. Research from Kaspersky Lab has shown that people are putting their online safety at risk by making bad password decisions and simple password mistakes that may have far-reaching consequences.

Read More

Free Cloud-based enterprise IoT Vulnerability Scanner

  • Published in

Retina IoT (RIoT) Scanner enables organizations to reliably identify and remediate vulnerabilities in at-risk IoT devices such as IP cameras, printers, routers.

Read More

First cyber security start-ups selected for GCHQ Cyber Accelerator

  • Published in

Seven start-ups, focusing on online security issues and threats, will join the new GCHQ Cyber Accelerator, powered by Wayra UK.

Read More

NEWS

New year, new risks: 2017’s top cyber threats

  • Published in

If there’s one thing that 2016 has proved, it’s that cyber threats are relentlessly evolving. Ransomware attacks are becoming more widespread, data breaches are growing in scale, and as businesses’ IT infrastructure is becoming more advanced, so are the threats that stand against it.

Read More

2017 Predictions

  • Published in

By Jeff Kukowski, Chief Operating Officer, SecureAuth.

Read More

Check Point vSEC integrates with VMware NSX for dynamic orchestration of advanced threat prevention...
Understanding the scale and magnitude of the use of unauthorised applications across the enterprise...
RSA, a Dell Technologies business, has unveiled a centralized platform that is designed to...
As IT spend moves to line of business managers, and with more than half spending at least 70% of...
Adapt stands out from the crowd during Cyber Essentials assessment.
Skyhigh Networks’ founder and CEO, Rajiv Gupta, outlines his top cyber security and cloud...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more