£2.5 million to recognise and reduce cyber-attack threats to critical infrastructure

  • Published in

New research co-funded by the Engineering and Physical Sciences Research Council (EPSRC) will focus on the cyber-security of the UK’s vital industrial control systems which run, for example, manufacturing plants, power stations, the electricity grid, and the rail network.

Read More

The Logic Group Maximises payment security

  • Published in

Point-to-Point Encryption reduces merchants’ vulnerability to a data breach or failed audit.

Read More

SignNow appliance brings Cloud Workflow Management to organisations

  • Published in

Barracuda Networks, Inc. has announced the general availability of Barracuda SignNow version 4.0 and the new Barracuda SignNow Appliance, now supporting deployments in both cloud and on-premises environments. SignNow allows organisations to obtain signatures from customers, partners and employees in seconds, and significantly reduces document turnaround time.

Read More

How to beat the top vulnerabilities

  • Published in

By Garry Sidaway, Global Director of Security Strategy at NTT Com Security.

Read More

Very small businesses eager for mobile technology but lack security

  • Published in

Very small businesses (VSBs) with fewer than 25 employees have the same rate of mobile device adoption as large enterprises. However, most VSBs lack the security awareness, technical expertise, and budget needed to properly protect company-issued or employee-owned (BYOD) mobile devices.

Read More

ManageEngine enhances identity and access management portfolio

  • Published in

ManageEngine, the real-time IT management company, has announced enhancements across its identity and access management portfolio, which cater to identity management and security needs of organisations running on Windows-based infrastructure.

Read More

Zero trust technologies that enable seamless, secure user authentication are critical; 6 in 10...
By Jamie Marshall, Chief Technology Officer, Calyx.
Lastline documents the pain data breaches cause security professionals.
Just over 13 percent of IT security professionals admit to being able to access previous...
LogMeIn has published results of a global study executed by IDG that reveals the new reality of...
While 87% of IT decision-makers feel their organisation’s perimeter security is effective at...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more