C2C announces availability of Compliance365

New offering gives Office 365 users better control over secured archives.

Read More



Wind River adds security boost

New Security Profile for Wind River Linux addresses growing security vulnerabilities as more devices become connected and intelligent.

Read More

Data breaches surge in 2014

SafeNet, Inc. has released the highlights from its SafeNet Breach Level Index (BLI) for the first quarter of 2014. Nearly 200 million records were stolen, the equivalent of approximately 93,000 records stolen every hour, between January and March, which was an increase of 233 per cent over the same time last year. Of the 254 data breaches that occurred during the quarter, only 1 per cent were “secure breaches,” or breaches where strong encryption, key management, or authentication...

Read More

The ‘threat’ of third party contractors

Vormetric has announced further analysis of its ‘Insider Threat' report, conducted in 2014 with industry analyst firm Ovum. Focusing on just those responses from IT decision-makers at financial services organisations in France, Germany, and the United Kingdom (a total of 92 responses), the research reveals how firms in the financial sector are evaluating their exposure to insider threats, and the steps they are taking in order to mitigate the risks.

Read More

Threat of fines, not FUD, drives board decisions on cybersecurity spend.
Suppliers of managed services are taking on more responsibilities as they become the driving...
Just under 70% also say they are preparing for an inevitable data breach.
Respondents identify people as biggest source of cyber threats, with Facebook and BA as most...
Veritas Technologies is warning knowledge workers to ‘think before they share’ sensitive data...
Gospel Technology, a data security startup, has released its first product, Gospel Cloud, to...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more