Security disconnect between IT and business users

According to new data from a global snapshot survey from SOTI Inc., more than 60 percent of enterprises have experienced a data breach or loss of data. Employees surveyed in the study admit to engaging in mobile device usage behaviors that puts their business' data at risk. More than 73 percent of consumers accessed corporate data from a free or public Wi-Fi connection; nearly 65 percent of consumers forwarded a work document or file to personal email address; and nearly 65 percent used...

Read More


Variations in IT sourcing strategies

Apptio has released its first IT Economics Report profiling enterprise IT spending patterns. Every month, the world’s largest organisations use Apptio’s Cost Transparency application to calculate and analyse over $160 billion in annual combined IT spend. For the Apptio IT Economics Report, the company analysed the IT investments made by its customers last year and found three common resourcing strategies. These patterns, or archetypes, each represent...

Read More

20% of IT professionals have witnessed a security breach cover-up

Javvad Malik, Security Advocate at AlienVault, says results show a need for far greater support for employees and businesses when they fall victim to cyber attacks.

Read More


Sixty-three per cent of C-suite more concerned about paying for the costs of a cybersecurity...
ICO security company launches Chainwatch, a real time monitoring product for ICOs.
CrowdStrike has formed a Global Partnership with five-time consecutive FIA Formula One™ World...
New working groups formed to secure adjacent technologies that are critical for end-to-end identity...
Latest version enables security teams to make faster and more informed decisions by providing a...
New research from Infoblox highlights cybersecurity challenges and opportunities during the...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more