Logo

Companies invest in security solutions but not staff

  • Published in

Just 4% of IT departments have staff dedicated to analysing IT security logs and only 6% have staff dedicated to acting on security reports.

Read More

NEWS

Security disrupts productivity

  • Published in

Help desks spend days dealing with user access complaints, while legitimate work gets blocked by over-zealous security tools.

Read More

Cybersecurity experts forecast future threats and proactive countermeasures

  • Published in

CompTIA releases new whitepaper on current and future threats based on input from cybersecurity specialists from global multinationals and UK cyber consultancies.

Read More

NEWS

Generation Y “digital native” employees are most likely to practice sloppy cyber security

  • Published in

New research from T-Systems into cyber security behaviour and awareness has found that Generation Y employees are much more likely to both over-estimate their knowledge while undertaking unsafe practices.

Read More

NEWS

Board falls short when it comes to cybersecurity

  • Published in

Respondents expect their transition to the cloud, as part of an organization’s digital transformation journey, to be a catalyst for an increased focus on security.

Read More

World’s first Cyber Insurance Policy comparison engine launched in London

  • Published in

Cyber|Decider brings clarity and growth for brokers for this specialist market.

Read More

The joint offering combines the expertise in Identity and Governance Administration from Omada with...
A study conducted by MIT Technology Review finds that 96% of security leaders are now preparing for...
Lack of Artificial Intelligence skills and a smart, connected approach to quality assurance impedes...
Founder of Wikipedia to discuss his views on Internet privacy and censorship.
New report examines whether the healthcare industry is prepared to combat evolving cyber threats.
Juniper Networks has released its Adaptive Threat Profiling feature for Juniper® Advanced Threat...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more