Cryptography advisory board receives a boost

Board will provide expert oversight of encryption schemes for advanced cloud security, and deliver a boost to enterprise adoption of cloud services.

Read More

vArmour Debuts in EMEA

‘Data Defined Perimeter’ solution protects critical assets wherever they reside by giving enterprises and service providers visibility, control and threat defences for the agile data centre.

Read More

The reality of rising DDoS attacks

Almost a quarter of European companies (23 per cent) consider DDoS (Distributed-Denial-of-Service) attacks one of their top three business threats, according to a survey conducted by B2B International and Kaspersky Lab.

Read More

State-sponsored attacks: The worst has yet to come

Survey reveals that hacking landscape will get much worse and IT security professionals cannot even confirm whether or not their network has already been breached.

Read More

Majority of organisations not confident in ability to protect data after a breach

74 per cent of IT decision-makers believe perimeter security is effective at keeping out security threats, yet 41 per cent believe unauthorised users are able to access their networks.

Read More


Key management-as-a-service (KMaaS) meets enterprise needs for direct control of encryption keys.
New IT Search feature speeds security investigations and audits with single web interface, allowing...
Security of data in the cloud now an executive-level concern; skills gap an added barrier to cloud...
Mit LanGuard 2014 R2 bringt GFI Software eine neue Version seiner preisgekrönten...
Infosys and Interbrand have revealed that the potential risk in brand value of a data breach to the...
‘There’s a threat, pass it on’: a negative communication cycle between vendors, IT leaders...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more