Commercial data security getting tougher as cyber attacks get super-smart

  • Published in

Cyber criminals are systematically testing businesses digital defences in order to steal financial and commercial information in greater numbers than ever using super-sophisticated software.

Read More

GFI Software launches GFI LanGuard 2014

  • Published in

To meet increasing threat levels, GFI expands GFI LanGuard’s vulnerability assessment capabilities to include mobile operating systems, Linux distributions, and even more third-party applications.

Read More

ISACA releases “Configuration Management: Using COBIT 5” to help businesses manage change

  • Published in

Change can cause business disruptions, inefficiencies and financial losses. Proper configuration management (CM) reduces the risk of malfunctions and increases efficiency during times of IT-related change. To help enterprises implement effective CM, global IT association ISACA has released a new guide, Configuration Management: Using COBIT 5.

Read More

100% of commuters put company data at risk over free public Wi-FI

  • Published in

Commuter study reveals commuters regularly connect to free, unsecure Wi-Fi services during their daily journey, putting personal and company data at risk every week.

Read More

Virtual Panda thrives in the cold

  • Published in

Logistics provider Peter Green Chilled offer Temperature Controlled services to the food industry supplying to the major retailers – including Tesco, Asda and Sainsbury's.

Read More

Allianz partners with forensic IT experts

  • Published in

Cyber crime is costing the UK economy £27bn.

Read More

Analysing your firm’s online habits is the first step towards bringing cyber security...
Industry demand for URL filtering grew 10 times since last year – slower progress compared to...
A third of companies do not have a data breach response plan.
Pulsant, UK provider of hybrid cloud services, is now a Cyber Essentials Certifying Body,...
Despite staggering interest, a top barrier to implementing Zero Trust strategies is, surprisingly,...
Traditionally a technique of the most talented hackers, automated SQL attack tools are putting...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more