Tier-3 builds on strengths in analytics, compliance, automation and incident response

New real-time Governance, Risk and Compliance dashboards deliver live, continuous compliance and security status view for business stakeholders.

Read More


76 per cent of UK IT pros rank their security above average

SolarWinds has released the results of its Information Security Confidence Survey, which explored IT professionals' confidence in their organisations' security measures and processes. The survey found that while confidence is notably high, likely the result of several key factors, widespread adherence to security best practices is lacking and significant, damaging attacks continue, potentially indicating this confidence is a false sense of security.

Read More

Verizon identifies key enterprise technology trends for 2015

Strategic network investments will be a major focus point for savvy CIOs in 2015, as companies seek to make sense of big data, transition to the cloud and monetize the Internet of Things (IoT), according to Verizon Enterprise Solutions’ list of top enterprise technology trends for 2015. In the coming year, enterprise organizations will also adopt technologies that drive business innovation and provide a strong platform for future growth.

Read More



94% of IT professionals feel perimeter security is effective at keeping unauthorised users out of...
Belden has announced an agreement to purchase cybersecurity leader Tripwire for $710M. Belden is a...
Research reveals UK organisations overwhelmingly using unsupported IT systems.
Experts from Cigital, Google, HP, Twitter and eight other organizations form IEEE Center for Secure...
Data security, business continuity and mobile devices were among the biggest trends impacting the...
According to a survey conducted by SailPoint Technologies Holdings, the majority (65 percent)...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more