ISACA issues COBIT 5 for Assurance

  • Published in

Establishing confidence in IT processes and controls is important, but audit and assurance processes often represent a pain point for business partners. Their perception is that assurance processes consume resources, slow activities and can lead to additional work—all to achieve goals they may not understand. ISACA’s new COBIT 5 for Assurance bridges the gap by translating assurance activities into a common language that is meaningful to business and technology partners and ties...

Read More

Chip-to-application transformation

  • Published in

McAfee introduces two new suites: McAfee Complete Endpoint Protection – Enterprise, and McAfee Complete Endpoint Protection – Business. These suites are the first to link security from chip to OS to applications, protecting against new threat vectors and bringing critical visibility to risk management. The suites are the first to include McAfee Deep Defender, a rootkit protection based on hardware-enhanced security jointly developed by Intel and McAfee, dynamic whitelisting, risk...

Read More

Small to mid-sized business IT budgets surge 19 percent

Hardware purchases drive increase in spending; backup/recovery software and tablets show strong growth.

Read More

Simplifying mobile security

  • Published in

McAfee has announced that McAfee Enterprise Mobility Management (McAfee® EMM™ software) is now fully integrated with the McAfee®ePolicy Orchestrator® (McAfee ePO™) platform. With McAfee EMM software, comprehensive security, policy, and management capabilities are extended to mobile devices. McAfee ePO software enables enterprises to protect their data on company-issued and employee-owned devices (smartphones, tablets, laptops, and desktop computers) through a single,...

Read More

CIOs need to optimise BYOD for new technologies

According to a new whitepaper revealed by independent datacentre consultancy, Glasshouse Technologies, Bring Your Own Device (BYOD) initiatives may not have met the expectations of employees, businesses or CIOs.

Read More

Carmarthenshire County Council chooses Trustwave

  • Published in

Carmarthenshire County Council recently chose Trustwave SIEM (Security Information and Event Management) to reduce the cost of meeting regulations associated with the sharing of information on the Government’s secure extranet. The Welsh county council reviewed alternative solutions when its incumbent solution ran out of capacity and needed upgrading.

Read More

CrowdStrike reveals the adversaries with the fastest breakout time.
Early adopter customer feedback validates the need for PREVENT product capabilities and Darktrace...
62% of employees reuse passwords across business and personal accounts, with 70% of leaders...
Netwrix survey reveals that employees at 54% of educational organisations use cloud applications to...
Cybereason has published results from a global study of organisations that had suffered a...
Nuvias Group, the European high value distributor, is further accelerating its growth through a...
Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more