NEWS

Data leakage attacks almost double

Cybersecurity leader recommends greater focus on data security as ICO data breach fines rise 20-fold.

Read More

NEWS

Communications 'chaos' causes security stress

‘There’s a threat, pass it on’: a negative communication cycle between vendors, IT leaders and employees leaves enterprises at risk.

Read More


NEWS

The cloud security conundrum

While 91% of organisations were successful in increasing security as a result of adopting cloud services, it remains a top concern for many. This finding comes from part two of the four-part Cloud Impact Study from Aptum, the global hybrid multi-cloud managed service provider. The report, titled The Security and Compliance Barricade, identifies common security, compliance and governance challenges impacting organizations undergoing cloud transformation.

Read More


NEWS

Organisations continue to make risky remote decisions

As we approach a year of what has now become out-of-office working, cybersecurity continues to be top of the agenda for businesses. With people spread across the nation, and in some cases the globe, many have opted for Endpoint Detection Response (EDR) solutions to protect their dispersed device networks and keep companies safe.

Read More

Pulse Secure has launched its Access Now Partner Program. Designed to offer partners the means to...
Thycotic has released the findings from its 2018 Black Hat conducted survey of more than 300...
Varonis Systems' DatAdvantage for Windows and DatAdvantage for SharePoint solutions help...
34% of businesses rank cyber as their top tech risk now, but only 44% feel prepared to respond to...
Webroot has announced expansion of its enterprise-class security solutions with the introduction of...
A cluster of companies in the UK’s Severn Valley have been identified in the latest search...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more