Logo

At least one in three ex-employees left with access to systems or data post termination

  • Published in

Over a third (36%) of desk-based workers in the UK and the US are aware of having continued access to a former employer’s systems or data, with nearly one in 10 actually accessing it.

Read More

Fonix Mobile selects Alert Logic to extend its secure cloud experience

  • Published in

Runs secure messaging and payment platform on Amazon Web Services.

Read More

Splunk for enterprise security

  • Published in

Splunk Inc. has announced the general availability of version 3.1 of the Splunk® App for Enterprise Security.

Read More

Moving to the cloud? Make sure you ask these security questions

  • Published in

By Stephen Coty, Chief security evangelist at Alert Logic.

Read More

New research showing major changes in the market to be presented at the Managed Services & Hosting Summit 2014

New sponsors announced including: Datto, NaviSite, Claranet, Modern Office, QLogic, Virtual Instruments, Webroot and Aurora Kendrik James.

Read More

IT has growing opportunity to become a strategic provider to the business

IT departments must free themselves from the pressures of tactical necessities before they can be seen as key contributors to business strategy and operational excellence.

Read More

MWR InfoSecurity launches Countercept service – to catch a thief it has to think like one.
New global survey of 450 IT and security professionals reveals the full impact that the pandemic...
Deploys integrated backup, recovery, archiving and network security.
NTT Com Security AG is expanding its commitment in Switzerland with the full acquisition of...
Polycom research reveals that IT leaders need to establish themselves in the boardrooms to respond...
Telia Carrier has published the findings of a new DDoS Threat Landscape Report, with a unique...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more