Data breaches prompt UK businesses to re-think data protection strategy

  • Published in

Trend Micro research finds majority of organisations lack customer notification processes required under impending EU Data Protection Regulation.

Read More

Cloud security best practice

  • Published in

By Andrew Tang at MTI.

Read More

How to implement the US Cybersecurity Framework

  • Published in

The technology that supports and protects an organization’s information is increasingly advanced and connected. It is also increasingly under attack. Earlier this year, the National Institute of Standards and Technology released the US Cybersecurity Framework (CSF) to help critical infrastructure providers. Now, new guidance from ISACA, an association of 115,000 global technology and business professionals, helps organizations of all sizes and in all industries use the CSF.

Read More

Security breaches can go undiscovered for weeks

  • Published in

Tripwire, Inc has announced the results of a survey of 215 attendees at the Black Hat USA 2014 security conference in Las Vegas, Nevada.

Read More

Increased demand for web apps hampered by lack of critical penetration

Inevitable growth of web apps leading to innovative new use cases yet many organisations still struggle with security implementation and testing.

Read More

IT professionals lack confidence to manage governance, risk and compliance

  • Published in

Dell Software survey shows nearly 100 percent of respondents in finance, retail and healthcare industries are worried about capability to meet compliance objectives.

Read More

New whitepaper guides organisations to address ISO/IEC 27002 security controls with the CyberArk...
ISACA, a global association serving 115,000 information systems (IS) governance, assurance, risk...
Pax8 has formed a new partnership with LogMeIn, providing its industry-leading password management...
A high-level delegation from the European Standardization Organizations (ESOs) – CEN, CENELEC...
Security BSides, the community-driven event built for and by information security community...
A survey of CIOs worldwide from Brocade (NASDAQ: BRCD) reveals the business impact of legacy...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more