Data-Shield and GMT360 partnership creates UK centre of technical excellence

Introducing the UK’s most technically competent “third party” service organisation with expertise across 55 vendors including legacy, end-of-life and mainframe systems.

Read More

LANDesk Software ‘unleashes’ Password Central

  • Published in

Self service tool empowers the end user with multi-access self-service password management.

Read More

New threats subverting digital signature validation

  • Published in

McAfee Labs has released the McAfee Labs Threats Report: Third Quarter 2013, which found new efforts to circumvent digital signature app validation on both PCs and Android-based devices. The McAfee Labs team identified a new family of mobile malware that allows an attacker to bypass the digital signature validation of apps on Android devices, which contributed to a 30 percent increase in Android-based malware. At the same time, traditional malware signed with digital signatures grew by 50...

Read More

Visibility into Cloud applications, user risk, and attacker methodologies

  • Published in

Rapid7 has announced the general availability of its cloud application and user risk management solution, Rapid7 UserInsight, as well as several enhancements to its information-driven security analytics portfolio. With these innovations, Rapid7 is the first and only security analytics provider to offer visibility into user behavior across on-premise and cloud networks, to integrate phishing exposure information into user risk assessment, and to deliver fully closed-loop vulnerability validation...

Read More

CloudSigma offers infrastructure-level firewalls

  • Published in

CloudSigma has announced the general availability of advanced network policy management across all its cloud locations. With this new feature, customers can create, manage and apply enterprise-grade networking policies in relation to their cloud infrastructure in a fully integrated way. By removing complexity and stressing usability, CloudSigma’s new networking policy features enable customers to enhance their security, while also saving time.

Read More

Temporary workers still require adequate data protection training, warns ICO

  • Published in

The Information Commissioner’s Office (ICO) is warning employers about the importance of making sure temporary staff – who regularly handle personal information - receive adequate data protection training.

Read More

Keepit has released a survey conducted by Foundry, as well as a study based on in-depth interviews...
Empowers IoT device manufacturers and operators with end-to-end security and compliance.
Saga, the company that specialises in providing exclusive services for the over 50s, is working...
Allurity has acquired Spanish multinational Aiuken Cybersecurity, as an important step in its...
New service offerings reinforce critical security controls, assess security weaknesses of...
New service addresses the resource gap that can result from CTEM.
Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more