Report outlines distinctive national and regional characteristics of nation-state driven cyber attacks

FireEye, Inc. has announced the release of a report titled, “World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks” that describes the unique international and local characteristics of cyber attack campaigns waged by governments worldwide.

Read More
White Paper ‘quashes’ EMEA data protection law myths

Dell SecureWorks has launched a white paper which seeks to overturn the myths surrounding data protection laws and how organisations can use Managed Security Service Providers (MSSP). In conjunction with law firm Field Fisher Waterhouse, experts in data protection and data security law, Dell...

Read More
Small businesses warned about importance of encryption, after London sole trader fined £5,000

The Information Commissioner’s Office (ICO) has warned small businesses that they must make sure they have adequate measures in place to keep customers’ details secure, after a sole trader was fined £5,000.

Read More
Insurance Giant Allianz partners with Incoming Thought

Cyber crime and data breaches are considered one of the top emerging risks for the 21st century and...

Read More
ICO carries resolution encouraging greater co-ordination of global data protection enforcement

The Information Commissioner’s Office (ICO) has won a resolution in Warsaw which is set to...

Read More
Employees causing security threats

Nearly 30% of employees are using personal cloud services to store work-related documents,...

Read More
UK companies getting better at cyber security

The number of security incidents detected by UK companies in the past 12 months is almost three...

Read More
IT security and risk managers divided over role of compliance within customer contact operations

Sabio interviews reveal organisations still struggling to find the right balance between ensuring...

Read More
Becrypt extends Enterprise Data Protection strategy with new secure file sharing solution

Becrypt mShare addresses the growing demands and conflicts that data leakage prevention is placing...

Read More
Security best practice guidelines

McAfee and the Digital Government Security Forum (DGSF) release a new report which explores the...

Read More
Commercial data security getting tougher as cyber attacks get super-smart

Cyber criminals are systematically testing businesses digital defences in order to steal financial...

Read More
Virtual Panda thrives in the cold

Logistics provider Peter Green Chilled offer Temperature Controlled services to the food industry...

Read More
100% of commuters put company data at risk over free public Wi-FI

Commuter study reveals commuters regularly connect to free, unsecure Wi-Fi services during their...

Read More
ISACA releases “Configuration Management: Using COBIT 5” to help businesses manage change

Change can cause business disruptions, inefficiencies and financial losses. Proper configuration...

Read More

Videos

Daniel Thorpe, Associate Director, Data Centre Research Lead, JLL, discusses the company’s ‘Data Centres 2024 Global Outlook Report’, which explores how data centers need to be designed, operated and...
Andy Bevan, Head of Propositions and Strategy Consulting at Daisy Corporate Services, discusses recent research findings which reveal that two-thirds of IT leaders say that legacy infrastructure is creating a...
Steve Haskew, Head of Sustainability and Social Leadership at Circular Computing, explains how the road to Net Zero almost certainly involves organisations considering their IT estate, especially in terms of...
Stephen Douglas, Head of Market Strategy at Spirent, discusses the company’s 5th annual 5G outlook report, which finds that 5G Standalone (SA) market is picking up significant speed, alongside similar...

Expert Opinions

By Adam Gaca, Vice President of Cloud Solutions at Future Processing.
By Rosemary Thomas, Senior Technical Researcher, AI Labs, Version 1.
By Kiran Bhageshpur, CTO at Qumulo.
By Ciaran Luttrell, Head of Security Operations Centre EMEA, eSentire.