Cloudy thinking: Why concerns about the cloud don’t translate into caution for most firms

  • Published in

By Christian Toon, Risk and Security Specialist at Iron Mountain.

Read More

AWS encryption

  • Published in

SafeNet, Inc. has announced key enhancements to SafeNet ProtectV that allow customers to encrypt Amazon EC2 workloads and maintain full ownership of encryption keys, with no need for on-premise hardware. SafeNet ProtectV with Virtual KeySecure is now available to run entirely on Amazon Web Services (AWS) infrastructure and is compatible with AWS CloudHSM, allowing customers to retain full ownership of their encryption keys while deploying entirely in the cloud. Through the AWS Marketplace,...

Read More

NED appointment signals intent to expand

  • Published in

LEADING business continuity and information security adviser Jermyn Consulting has signalled clear intent to push ahead with expansion plans by appointing one of the UK’s top Non-Executive Directors to its board.

Read More

Thales unveils Cyber Integration & Innovation Centre

  • Published in

Unique facility reinforces Thales’s commitment to improving UK’s cyber security.

Read More

Surge in SQL injection

  • Published in

Traditionally a technique of the most talented hackers, automated SQL attack tools are putting enterprises at greater risk of data breach.

Read More

Dell delivers connected security vision

  • Published in

Four new and updated solutions provide immediate value in protecting the organization, dramatically reducing business risk.

Read More

Cryptzone, a provider of dynamic, context-aware network, application and content security...
The Internet of Things (IoT) continues to gain momentum as vendors and enterprises begin to embrace...
By Poul Nielsen - Director of Strategy, Nexthink.
Organisations will be hit hard when EU Cyber Security Directive comes into force.
Simeio Solutions brings flexible managed identity services and technical expertise to help...
How UK organisations can apply a data-centric approach to cybersecurity, privacy and other...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more