Companies invest in security solutions but not staff

  • Published in

Just 4% of IT departments have staff dedicated to analysing IT security logs and only 6% have staff dedicated to acting on security reports.

Read More

NEWS

Security disrupts productivity

  • Published in

Help desks spend days dealing with user access complaints, while legitimate work gets blocked by over-zealous security tools.

Read More

Cybersecurity experts forecast future threats and proactive countermeasures

  • Published in

CompTIA releases new whitepaper on current and future threats based on input from cybersecurity specialists from global multinationals and UK cyber consultancies.

Read More

NEWS

Generation Y “digital native” employees are most likely to practice sloppy cyber security

  • Published in

New research from T-Systems into cyber security behaviour and awareness has found that Generation Y employees are much more likely to both over-estimate their knowledge while undertaking unsafe practices.

Read More

NEWS

Board falls short when it comes to cybersecurity

  • Published in

Respondents expect their transition to the cloud, as part of an organization’s digital transformation journey, to be a catalyst for an increased focus on security.

Read More

World’s first Cyber Insurance Policy comparison engine launched in London

  • Published in

Cyber|Decider brings clarity and growth for brokers for this specialist market.

Read More

Michael Aminzade, VP Global Compliance & Risk Services at Trustwave reflects on another year of...
Research provides insights into cyber attacks that abuse hijacked privileged credentials to...
Shell Control Box becomes a Citrix Ready verified PIM tool for Citrix 7.6 platforms.
Dell Engineered Solutions for VMware EVO: RAIL to deliver data center simplification with...
The 2015 Data Protection Best Practices and Risk Assessment Guides has revealed that in January to...
Exabeam and SecureAuth + Core Security have formed a collaborative relationship to secure...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more