IT more complex than ever, say 93 per cent of UK CIOs

  • Published in

Cloud computing, legacy technology and software licensing cited as biggest contributors to IT complexity.

Read More

Mobility is a critical success driver

  • Published in

Mobility is transforming how enterprises do business, and most organisations expect the burgeoning focus on mobility will consume, on average, nearly one fifth of their IT budgets in 2016. That’s according to a new poll completed by senior IT personnel across a range of industries, and announced today at Gartner Symposium/ITxpo 2015.

Read More

Public networks used for corporate access

  • Published in

Bromium®, Inc. has published the results of “CTIA Super Mobility – Understanding Mobility and Risk,” a survey of mobile users who attended the CTIA Super Mobility 2015 conference, focused on public network access patterns. The research reveals that the majority of mobile users access corporate assets through public networks, despite being aware of their security risk.

Read More

The 'outside' insider threat

  • Published in

61 percent cite privileged account takeover as most difficult cyber attack stage to mitigate; 44 percent still believe they can prevent attackers from breaking into a network.

Read More

Code42 secures $85 million in funding

  • Published in

Code42 has secured $85 million in Series B funding led by new investors JMI Equity, a growth equity firm focused on investing in leading software and services companies, and global venture capital firm New Enterprise Associates, Inc. (NEA).

Read More

Cybercrime is a 'grave threat' to the economy and law enforcement

  • Published in

Research produced for the City of London Corporation and supported by the City of London Police has shed light on the severity of economic cybercrime, with the data illustrating the scale of the issue affecting businesses and individuals. 

Read More

Intel Security report shows majority of IT budgets will focus on cloud, indicates need for...
Databarracks has announced the launch of its new reseller network, the Databarracks Partner...
Adrian Bisaz appointed to build on Corero’s success in defending against DDoS, and malicious...
Customers with Cisco’s ACI can now benefit from Radware’s security services to...
Shavlik Protect is now available in the Microsoft Azure Marketplace, enabling users to install the...
LogRhythm has released its report, The State of the Security Team: Are Executives the Problem? The...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more