Senior management have unrealistic expectations about IT downtime

  • Published in

Report identifies gap between IT and senior management expectations.

Read More

British Crime Survey reveals the true scale of fraud and cyber crime

  • Published in

The results for the British Crime Survey for the first time show that fraud and cyber crime are the most prevalent crimes committed against people in England and Wales.

Read More

Research reveals 2016's top IT challenges

  • Published in

Global survey of 2,685 IT pros highlights the biggest challenges IT teams face in the battle over the increasing complexity, security threats and importance of mission critical applications and infrastructure.

Read More

NEWS

Report reveals the dangers of the Dark Web

  • Published in

Hidden Data Economy report exposes price points for stolen data bought and sold in cybercriminal marketplaces.

Read More

Cyber London seeks out Europe’s brightest security start-ups

  • Published in

Cyber London has started its second programme to support the brightest new European security companies.

Read More

NEWS

Dell to acquire EMC

  • Published in

Brings together the industry’s leading innovators in digital transformation, software-defined data centre, hybrid cloud, converged infrastructure, mobile and security.

Read More

Almost a quarter of European companies (23 per cent) consider DDoS (Distributed-Denial-of-Service)...
Panel of Global 1000 CISOs share advice for implementing strategic security programmes, gaining...
Intel Security has released its McAfee Labs Threats Report: February 2015, including assessments of...
Nearly seven out of ten attacks on all firms involved viruses, spyware or malware.
Cyren has revealed that FINEOS, a leader in life, accident, and health insurance software, has...
Survey shows more than half of companies attacked have critical data stolen as a result of DDoS.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more