Security best practice guidelines

McAfee and the Digital Government Security Forum (DGSF) release a new report which explores the cyber risks confronting government and offers recommendations to mitigate these risks, entitled ‘Operating Securely in the Digital World’. The report provides the outlines of two tools, a suggested Review Process and proposed Development Framework to help boards, senior managers and information teams in organisations that would like to review their information security strategies and...

Read More

Commercial data security getting tougher as cyber attacks get super-smart

Cyber criminals are systematically testing businesses digital defences in order to steal financial and commercial information in greater numbers than ever using super-sophisticated software.

Read More

GFI Software launches GFI LanGuard 2014

To meet increasing threat levels, GFI expands GFI LanGuard’s vulnerability assessment capabilities to include mobile operating systems, Linux distributions, and even more third-party applications.

Read More

ISACA releases “Configuration Management: Using COBIT 5” to help businesses manage change

Change can cause business disruptions, inefficiencies and financial losses. Proper configuration management (CM) reduces the risk of malfunctions and increases efficiency during times of IT-related change. To help enterprises implement effective CM, global IT association ISACA has released a new guide, Configuration Management: Using COBIT 5.

Read More

100% of commuters put company data at risk over free public Wi-FI

Commuter study reveals commuters regularly connect to free, unsecure Wi-Fi services during their daily journey, putting personal and company data at risk every week.

Read More

Virtual Panda thrives in the cold

Logistics provider Peter Green Chilled offer Temperature Controlled services to the food industry supplying to the major retailers – including Tesco, Asda and Sainsbury's.

Read More

New partnership extends Becrypt’s international footprint, opening up new markets in the USA.
Attackers chose reflection versus infection techniques to achieve larger DDoS attacks.
AlienVault plans to work with HP to broaden the reach of cyber threat intelligence sharing to...
New AppGate XDP release simplifies access security and ensures that all resources – private...
Infosys and Interbrand have revealed that the potential risk in brand value of a data breach to the...
New Unisys Stealth for Mobile solution protects against data breaches and other cybersecurity risks...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more