More endpoints mean more security

  • Published in

The two most transformative trends impacting IT service providers (ITSPs) are endpoint growth and demand for security services according to a new Autotask survey of more than 1,100 global ITSPs.

Read More

iSheriff names John Mutch as CEO

  • Published in

iSheriff, a leading cloud security company, has appointed John Mutch as its new Chief Executive Officer (CEO) and a member of its board of directors, effective immediately. As CEO, Mutch is responsible for the future direction of the organisation and leading the company’s overall operations, with direct oversight of sales, marketing, professional services, R&D and corporate strategy.

Read More

44% of enterprises will increase information security spending

  • Published in

But staffing obstacles hamper SIEM implementations.

Read More

NEWS

2016 – the rise of the cyber security and data breach reporting officer

  • Published in

A leading crime lawyer predicts 2016 to be the year where organisations appoint dedicated cyber security and data breach reporting officers as part of their legal compliance obligations.

Read More

Connected visibility

  • Published in

Pwnie Express, provider of real-time threat detection of all the wireless and wired devices in and around workplaces, has announced European availability of its Pwn Pulse SaaS platform. European organizations can now detect rogue, misconfigured, and unauthorized devices, from phones and printers to malicious access points, across wired and wireless spectrums. Visibility from Pwn Pulse helps European companies more comprehensively protect critical business infrastructure while...

Read More

Looking to the sky: drones, cloud and IoT are the new frontiers for cyber security

  • Published in

A10 Networks suggests that we look to the sky to prepare for our defence, as drones, cloud and Internet of Things are the new frontiers for new cyber security threats.

Read More

Respondents identify people as biggest source of cyber threats, with Facebook and BA as most...
Eighty-one percent of security professionals believe cyber attackers will target machine...
Panel of Global 1000 CISOs share advice for implementing strategic security programmes, gaining...
Zscaler report provides insights into user behaviour and the challenges with mobility and remote...
By Calum MacLeod, VP of EMEA at Lieberman Software.
Institute secures its networks and mobile devices using Check Point’s advanced threat...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more