£2.5 million to recognise and reduce cyber-attack threats to critical infrastructure

  • Published in

New research co-funded by the Engineering and Physical Sciences Research Council (EPSRC) will focus on the cyber-security of the UK’s vital industrial control systems which run, for example, manufacturing plants, power stations, the electricity grid, and the rail network.

Read More

The Logic Group Maximises payment security

  • Published in

Point-to-Point Encryption reduces merchants’ vulnerability to a data breach or failed audit.

Read More

SignNow appliance brings Cloud Workflow Management to organisations

  • Published in

Barracuda Networks, Inc. has announced the general availability of Barracuda SignNow version 4.0 and the new Barracuda SignNow Appliance, now supporting deployments in both cloud and on-premises environments. SignNow allows organisations to obtain signatures from customers, partners and employees in seconds, and significantly reduces document turnaround time.

Read More

How to beat the top vulnerabilities

  • Published in

By Garry Sidaway, Global Director of Security Strategy at NTT Com Security.

Read More

Very small businesses eager for mobile technology but lack security

  • Published in

Very small businesses (VSBs) with fewer than 25 employees have the same rate of mobile device adoption as large enterprises. However, most VSBs lack the security awareness, technical expertise, and budget needed to properly protect company-issued or employee-owned (BYOD) mobile devices.

Read More

ManageEngine enhances identity and access management portfolio

  • Published in

ManageEngine, the real-time IT management company, has announced enhancements across its identity and access management portfolio, which cater to identity management and security needs of organisations running on Windows-based infrastructure.

Read More

SailPoint Technologies Holdings has unveiled the SailPoint Predictive Identity™ platform, the...
By Johnny Carpenter, UK Director, iland.
By Russell Horton, COO at Elitetele.com examines the importance of securing your business against...
Postquantum cryptography and machine learning research initiatives currently underway in...
Easy to follow staff education and training toolkit on data security issues.
Fragmented priorities, total cost of ownership seen as inhibitors of enterprise adoption.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more