Five steps businesses need to take to become cyber robust in 2014

One of the biggest challenges for businesses in the New Year is to become ‘cyber robust’ – according to a leading cyber security expert. Jan Veldsink who consults to businesses on IT security and has developed the Business and Cyber Robustness Executive MBA module at Nyenrode Univeriteit in The Netherlands, says that managers from all business units need to be able to predict threats and have strategies in place to deal with IT security breaches.

Read More

Happy Secure 2014

AppRiver's senior security analyst, Troy Gill, offers his top 10 list of security resolutions everyone should be making to stay stafe and out of a criminal's clutches next year:

Read More

WatchGuard's top 8 security predictions for 2014

Could a Hollywood hack come true? Will there be a U.S. Healthcare.gov data breach? Should you expect CryptoLocker clones?

Read More

Cloud feeds on Cloud

According to a recent independent pan-European survey, cloud-based identity and access management could give UK organisations, negative about the cloud, the confidence to adopt cloud services and become tomorrow’s cloud evangelists.

Read More

The race to stem cybercrime using biometrics is on

Aite Group assesses nine emerging technology vendors that could bring biometric authentication into mainstream use.

Read More

AlienVault is partnering with Deutsche Telekom and T-Systems, the ICT division of Deutsche Telekom,...
Enters the security market with groundbreaking cyber intelligence technology.
According to a recent independent pan-European survey, cloud-based identity and access management...
asks Keith Graham, CTO for SecureAuth.
By Campbell Williams, group strategy and marketing director, Six Degrees Group.
“Securing the New Hybrid Workplace” report from Entrust found 91% of employees are in favor of...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more