Two in five British adults affected by data breaches

Individuals are putting themselves at increased risk of identity theft by failing to follow the basics of online identity protection.

Read More

Call for more public-private cooperation over cybersecurity

Information technology (IT) executives within critical infrastructure organisations see a need for public-private threat intelligence sharing partnerships (86% of respondents) to keep pace with escalating cybersecurity threats, according to a survey released today by The Aspen Institute and Intel Security. A majority (76%) of survey respondents also indicated they believe a national defence force should respond when a cyber attack damages a critical infastructure company within national...

Read More



WhiteHat Security introduces Acceleration Services

WhiteHat Security, the web security company, has introduced the rollout of its new WhiteHat Acceleration Services which are intended to help its customers advance their security programs through a variety of service offerings, such as remediation capabilities and services, and training engagements.

Read More

Lack of surprise over poor security

Research conducted by Varonis Systems found that over 50% of IT security professionals are not surprised that end users have access to more company data than they should have.

Read More

AlienVault USM selected to extend the security management of the Malta Information Technology...
Highest priorities for IT teams are cybersecurity, cloud, data analytics and network infrastructure...
Defence plans should be made around an asset based approach.
By Tony Craythorne, VP of Worldwide Business Development, Quorum.
Webroot has announced expansion of its enterprise-class security solutions with the introduction of...
One in three UK employees (33%) used personal devices or cloud services to store employer data in...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more