Data breaches prompt UK businesses to re-think data protection strategy

Trend Micro research finds majority of organisations lack customer notification processes required under impending EU Data Protection Regulation.

Read More


How to implement the US Cybersecurity Framework

The technology that supports and protects an organization’s information is increasingly advanced and connected. It is also increasingly under attack. Earlier this year, the National Institute of Standards and Technology released the US Cybersecurity Framework (CSF) to help critical infrastructure providers. Now, new guidance from ISACA, an association of 115,000 global technology and business professionals, helps organizations of all sizes and in all industries use the CSF.

Read More

Security breaches can go undiscovered for weeks

Tripwire, Inc has announced the results of a survey of 215 attendees at the Black Hat USA 2014 security conference in Las Vegas, Nevada.

Read More


Akamai Technologies and Trustwave have formed a strategic alliance designed to help businesses more...
The number of security incidents detected by UK companies in the past 12 months is almost three...
Top 5 predictions fromVincent Smyth, GM & Senior VP EMEA, Flexera Software.
By Toyin Adelakun, a VP at Sestus.
The Cisco 2014 Midyear Security Report examines the "weak links" in organizations that...
Intel self-encrypting drives (SEDs) managed by Wave fill a void for government and enterprise...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more