At least one in three ex-employees left with access to systems or data post termination

Over a third (36%) of desk-based workers in the UK and the US are aware of having continued access to a former employer’s systems or data, with nearly one in 10 actually accessing it.

Read More

ISACA outlines five principles for effective information and technology governance

In new guidance issued today, global IT association ISACA outlines five principles organizations can use to effectively govern and manage their information and technology.

Read More

Splunk for enterprise security

Splunk Inc. has announced the general availability of version 3.1 of the Splunk® App for Enterprise Security.

Read More


DeltaCredit selects Boldon James Classifier to secure information assets

Boldon James delivers data classification to drive DLP solution and prevent data loss incidents.

Read More


2016 will be the year of cloud security and ROI, a year when CISOs finally get the recognition they...
Mimecast has released new research which highlights the risky behavior of employees using...
The cost of recovering from of a security breach for UK organisations has been estimated in a new...
Sophos has published findings from its survey report, “The State of Ransomware in Financial...
Both technical teams and general staff need more frequent guidance on recognising and dealing with...
RiskIQ has released its annual "Evil Internet Minute" security intelligence report. The report taps...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more