Cloud FUD fails to match up with experiences, says CIF

  • Published in

Research finds just 2 per cent of cloud users have experienced a data breach.

Read More

Nine out of the top ten mobile operator groups now securing their networks with AdaptiveMobile

  • Published in

Grows team with senior management and security guru appointments.

Read More

Tech industry veteran Mike Bennett joins AlienVault Advisory Board

  • Published in

AlienVault says that technology industry veteran Mike Bennett will join the company’s Advisory Board as a senior industry advisor.

Read More

IBM and Intel bring new security features to the cloud

SoftLayer first to offer added security down to the chip level to boost hybrid cloud deployments.

Read More

Espion enhances its Cloud Assurance credentials

  • Published in

Leaders in managing and securing corporate information Espion, has further strengthened its cloud security expertise through corporate membership of Cloud Security Alliance (CSA) - the global pioneers of promoting best practices for security assurance within cloud computing.

Read More

UK users unable to detect phishing

  • Published in

McAfee Labs has released the McAfee Labs Threats Report: August 2014, revealing that phishing continues to be an effective tactic for infiltrating enterprise networks.

Read More

Strategic network investments will be a major focus point for savvy CIOs in 2015, as companies seek...
By Steve Weiner, Offering Manager - Data Centres at Fujitsu UK and Ireland.
Huge demand for security automation driven by the growing number and sophistication of cyber...
Innovative bring your own key (BYOK) capability allows businesses to retain control of critical...
The intelligent use of IT budgets to drive innovation and support services is key for business...
Research reveals UK organisations overwhelmingly using unsupported IT systems.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more