One third of European businesses to introduce wearable technology to the workplace in 2015

However, over three quarters of businesses in the UK, France and Germany admit they have no policy for managing the impact of wearables joining the network.

Read More

Why a different approach towards data security is needed

  • Published in

By Phil Holmes, UK Channel Director, SafeNet.

Read More

WatchGuard predicts five security trends you should NOT worry about in 2015 and five you should

  • Published in

From passwords and the IoT to nation state cyber warfare and jumping mobile malware, WatchGuard provides a security perspective for 2015.

Read More

Connected identity at the centre of everything

  • Published in

ForgeRock Inc. is updating its ForgeRock® Identity Platform, the first massively scalable, 100-percent commercial, open-source solution for Identity and Access Management (IAM), with new releases of OpenAM 12.0, OpenIDM 3.1 and OpenIG 3.1.

Read More

Mobility spurs major changes in enterprise governance strategies

  • Published in

Enterprise mobility and the proliferation of endpoints are driving profound changes in how organisations handle information governance, according to a Forrester Consulting survey commissioned by Druva. Companies are planning significant increases in governance-related spending, accelerated centralisation of governance programs, greater inclusion of endpoint content in eDiscoverydata collection initiatives, and others measures designed to address concerns over both the volume and the...

Read More

Number of victims of targeted attacks more than doubles in 2014

  • Published in

Kaspersky Lab has undertaken a master review of the key events that defined the threat landscape in 2014. Among a range of security incidents, targeted attacks and malicious campaigns stand out, particularly in terms of their scale and impact on businesses, governments, public and private institutions.

Read More

Survey also reveals challenges with remote workers and business continuity in 2021.
HP Wolf Security threat research team sees cybercriminals using legitimate cloud providers to host...
Many of today’s most destructive advanced persistent threats (APTs) were conceived a decade...
Research from SecureAuth reveals two in five (39%) IT decision makers in the UK admit that...
Sophos has introduced an advanced server protection product that combines whitelisting and...
McAfee Enterprise has introduced MVISION Private Access, an integrated approach to enable granular...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more