Logo

Security best practice guidelines

  • Published in

McAfee and the Digital Government Security Forum (DGSF) release a new report which explores the cyber risks confronting government and offers recommendations to mitigate these risks, entitled ‘Operating Securely in the Digital World’. The report provides the outlines of two tools, a suggested Review Process and proposed Development Framework to help boards, senior managers and information teams in organisations that would like to review their information security strategies and...

Read More

Commercial data security getting tougher as cyber attacks get super-smart

  • Published in

Cyber criminals are systematically testing businesses digital defences in order to steal financial and commercial information in greater numbers than ever using super-sophisticated software.

Read More

GFI Software launches GFI LanGuard 2014

  • Published in

To meet increasing threat levels, GFI expands GFI LanGuard’s vulnerability assessment capabilities to include mobile operating systems, Linux distributions, and even more third-party applications.

Read More

ISACA releases “Configuration Management: Using COBIT 5” to help businesses manage change

  • Published in

Change can cause business disruptions, inefficiencies and financial losses. Proper configuration management (CM) reduces the risk of malfunctions and increases efficiency during times of IT-related change. To help enterprises implement effective CM, global IT association ISACA has released a new guide, Configuration Management: Using COBIT 5.

Read More

100% of commuters put company data at risk over free public Wi-FI

  • Published in

Commuter study reveals commuters regularly connect to free, unsecure Wi-Fi services during their daily journey, putting personal and company data at risk every week.

Read More

Virtual Panda thrives in the cold

  • Published in

Logistics provider Peter Green Chilled offer Temperature Controlled services to the food industry supplying to the major retailers – including Tesco, Asda and Sainsbury's.

Read More

Pulse Secure NAC mitigates endpoint visibility, compliance and IoT security risks.
Cyber criminals are systematically testing businesses digital defences in order to steal financial...
IT is a revolving door of change. While most industries have had to get on board with the digital...
Intel self-encrypting drives (SEDs) managed by Wave fill a void for government and enterprise...
As one of the leading types of cyber-attacks, ransomware is expected to dominate cybercrime in...
Top business priority is improving efficiency.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more