Centrify survey finds unmanaged Apple devices are a liability for corporations

  • Published in

Lack of encryption and weak or shared passwords expose sensitive corporate and customer information.

Read More

Intel Security appoints Richard Steranka to lead global partner efforts

  • Published in

Former vice president of Avaya's worldwide partner organisation to bring proactive security to global partner network.

Read More

Jimmy Wales confirmed as opening keynote speaker at IP EXPO Europe 2015

Founder of Wikipedia to discuss his views on Internet privacy and censorship.

Read More

Security specialist strengthens IT team

  • Published in

A Lancashire IT company is adding muscle to its growing team with the appointment of a computer network security expert to help its clients better protect their IT systems.

Read More

Demand for IT security skills grows

  • Published in

Almost half (47%) of UK CIOs and CTOs will add extra IT security personnel to their teams in 2015 as companies spend a fifth of their IT budget on security.

Read More

Put information security ahead of infrastructure security  

  • Published in

By Mark Edge, Country Manager UK, Brainloop.

Read More

UK CISOs and IT Managers feel isolated and fearful of losing jobs as data breach wave rolls in,...
Trend Micro research finds majority of organisations lack customer notification processes required...
Gartner has highlighted the top 10 technologies for information security and their implications...
21 million malware samples detected in Q2 2015, an average of 230,000 new samples daily. Up 43% on...
Intel self-encrypting drives (SEDs) managed by Wave fill a void for government and enterprise...
OneLogin has announced that Digital Intelligence Systems (DISYS), a global IT staffing and services...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more