Top predictions for IT organizations and users for 2014 and beyond

Gartner, Inc. has revealed its top predictions for IT organizations and IT users for 2014 and beyond. Gartner's top predictions for 2014 combine several disruptive topics — Digital Industrial Revolution, Digital Business, Smart Machines and the Internet of Things — that are set to have an impact well beyond just the IT function.

Read More



SAI Global deploys Tenable security

SAI Global has implemented the Tenable SecurityCenter enterprise security solution and Nessus®, the industry’s most widely-deployed vulnerability and configuration assessment product. The deployment provides SAI Global with a dashboard view of all security vulnerabilities, configuration and compliance failures, propelling workplace productivity while reducing company risk.

Read More

Cybersecurity approaches to APTs are often 10 years out of date

Many of today’s most destructive advanced persistent threats (APTs) were conceived a decade ago, so enterprises that rely on most traditional approaches to cybersecurity are unlikely to succeed against the next generation of attacks. This is one of the cautions in a new book published by global IT association ISACA in Cybersecurity Awareness Month.

Read More

Unisys unveils Stealth solution

New Unisys Stealth for Mobile solution protects against data breaches and other cybersecurity risks created by proliferation of consumer devices in the workplace.

Read More

According to research from Cisco, critical company data is at risk in the UK as a result of...
New centre will give Middle Eastern and European customers immediate insight into local cyber...
Despite headline-making breaches that have called attention to the importance of data encryption,...
Bromium has published “Endpoint Exploitation Trends 2015,” a Bromium Labs research report...
21 million malware samples detected in Q2 2015, an average of 230,000 new samples daily. Up 43% on...
Research from SecureAuth reveals two in five (39%) IT decision makers in the UK admit that...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more