IT more complex than ever, say 93 per cent of UK CIOs

  • Published in

Cloud computing, legacy technology and software licensing cited as biggest contributors to IT complexity.

Read More

Mobility is a critical success driver

  • Published in

Mobility is transforming how enterprises do business, and most organisations expect the burgeoning focus on mobility will consume, on average, nearly one fifth of their IT budgets in 2016. That’s according to a new poll completed by senior IT personnel across a range of industries, and announced today at Gartner Symposium/ITxpo 2015.

Read More

Public networks used for corporate access

  • Published in

Bromium®, Inc. has published the results of “CTIA Super Mobility – Understanding Mobility and Risk,” a survey of mobile users who attended the CTIA Super Mobility 2015 conference, focused on public network access patterns. The research reveals that the majority of mobile users access corporate assets through public networks, despite being aware of their security risk.

Read More

The 'outside' insider threat

  • Published in

61 percent cite privileged account takeover as most difficult cyber attack stage to mitigate; 44 percent still believe they can prevent attackers from breaking into a network.

Read More

Code42 secures $85 million in funding

  • Published in

Code42 has secured $85 million in Series B funding led by new investors JMI Equity, a growth equity firm focused on investing in leading software and services companies, and global venture capital firm New Enterprise Associates, Inc. (NEA).

Read More

Cybercrime is a 'grave threat' to the economy and law enforcement

  • Published in

Research produced for the City of London Corporation and supported by the City of London Police has shed light on the severity of economic cybercrime, with the data illustrating the scale of the issue affecting businesses and individuals. 

Read More

HyTrust Boundary Controls ensure tighter geographic restrictions to ease compliance, deter data...
BeyondTrust has launched BeyondInsight Clarity, an advanced threat analytics capability that...
Mitek’s digital identity verification solution helps Ajax streamline the online experience and...
Internet users across the globe are yet to master how to use passwords effectively to protect...
US pipeline cyberattack is a ‘timely reminder’ highlighting the need for cyber insurance,...
Appoints Henry Seddon as Vice President EMEA.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more