Releasing your inner innovator

The role of the IT Director is changing. Having fought for years to gain a seat on the board, with mixed success, the inevitable shift of IT infrastructure to the cloud finally presents the IT Director with a chance to fundamentally change the role and deliver true strategic innovation. Removing the routine tasks of day to day infrastructure administration and planning for server/networking refresh releases the IT Director to focus on the real areas of technology innovation that can support...

Read More

Essex County Council chooses Fujitsu for £16.6m IT transformation project

Fujitsu has secured a deal with Essex County Council to transform its Corporate Systems estate. Under the terms of the contract, Fujitsu will implement a fully integrated and modernised ERP environment that also delivers enhanced functionality to retained legacy applications. The project supports the Council’s long-term financial strategy to save at least £235m over the next three years while helping it to become more operationally efficient and expand the services it can offer to...

Read More

ISACA issues first audit programs aligned with COBIT 5

Global IT association ISACA has issued five new audit programs—the first of more than 30 audit programs that will align with COBIT 5. The new audit/assurance programs released today provide assurance over the governance domain processes:

Read More

AlienVault continues rapid expansion of Open Threat Exchange

AlienVault™ has announced continued momentum behind its Open Threat Exchange™ (OTX) initiative with the addition of new partners Cegeka, GoGrid, Netflow Logic, Onsight, Risk I/O and ThreatStop. In addition, the integration of AlienVault’s OTX into Spiceworks has helped IT professionals simplify how they identify threats on their network. Spiceworks users in nearly 10,000 companies received over 1.4 million threat alerts in January 2014, only one month after the new...

Read More

Lessons learnt from blocking millions of cyber attacks

FireHost has announced the release of its 2013 year in review Superfecta report (available for download here link and by request). Using real-life data from the 100m+ malicious hack attempts FireHost blocked in the last 12 months, the Superfecta report contains a quarter-by-quarter guide to the biggest cybercrime trends and incidents in 2013, including expert analysis from both FireHost’s IT security teams and partners.

Read More

DNA to detect pass-the-hash vulnerabilities

CyberArk has unveiled the latest version of Discovery & Audit (DNA), said to be the first tool on the market to identify and map exposed privileged password hashes and all related vulnerable machines on a network. CyberArk DNA is a patent-pending, light-weight, stand alone tool that exposes the magnitude of privileged account security risks by enabling organisations to easily identify and analyse all privileged accounts across their network. CyberArk DNA v4 free trial licenses are currently...

Read More

Organisations apply stronger PKI security controls due to their increasingly critical role today.
Ransomware surpassed the worst expectations in 2021, with attacks against critical infrastructure,...
A10 Networks’ Application Delivery Controllers (ADCs) ensure that The Bunker’s data centre...
Not knowing future cost and lack of control with licensing costs causes major concerns.
Almost half (48%) of incidents occurred as a result of introduction of viruses/malware from third...
The partnership enables Dataproof to provide affordable and efficient cybersecurity to rapidly...
Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more