Companies need to stop divorcing themselves from cyber security

The 2015 Data Protection Best Practices and Risk Assessment Guides has revealed that in January to June last year over 30 per cent of data breaches involving the loss of personally identifiable information (PII) were caused by internal intrusions -- while a further 29 per cent were caused either accidentally or maliciously by employees. Richard Pharro, CEO of APM Group, gives his opinions on the issue.

Read More



New report helps Victims Service Alliance organisations meet data protection challenge

The Information Commissioner’s Office (ICO) has published a report highlighting how organisations attached to the Victims Services Alliance (VSA) are looking after people’s information in compliance with the Data Protection Act (DPA). 

Read More


IT resilience more important than ever as the demand for data expands across all platforms

Vision Solutions Inc. has announced its Seventh Annual State of Resilience Report. Entitled “The Future of IT: Migrations, Protection & Recovery Insights,” the report highlights trends, opportunities and challenges for IT and business leaders alike. In addition, the company will conduct a live webcast on Jan. 22 detailing the results of the research.

Read More

Alert Logic, the leading provider of Security-as-a-Service for the cloud, today announced...
Survey reveals UK office workers do not understand basic security threats and organisations are...
Think of cyber attacks and the chances are computer hacking will be the first, and possibly only,...
The past year has been a whirlwind tour of challenges and changes. Targeted threat activity...
Alert Logic Intrusion Detection and Log Management capabilities improve Oracle business application...
Network management company Infoblox and its Cyber Intelligence Unit (CIU), have released the latest...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more