NEWS

Data leakage attacks almost double

Cybersecurity leader recommends greater focus on data security as ICO data breach fines rise 20-fold.

Read More

NEWS

Communications 'chaos' causes security stress

‘There’s a threat, pass it on’: a negative communication cycle between vendors, IT leaders and employees leaves enterprises at risk.

Read More


NEWS

The cloud security conundrum

While 91% of organisations were successful in increasing security as a result of adopting cloud services, it remains a top concern for many. This finding comes from part two of the four-part Cloud Impact Study from Aptum, the global hybrid multi-cloud managed service provider. The report, titled The Security and Compliance Barricade, identifies common security, compliance and governance challenges impacting organizations undergoing cloud transformation.

Read More


NEWS

Organisations continue to make risky remote decisions

As we approach a year of what has now become out-of-office working, cybersecurity continues to be top of the agenda for businesses. With people spread across the nation, and in some cases the globe, many have opted for Endpoint Detection Response (EDR) solutions to protect their dispersed device networks and keep companies safe.

Read More

Cyber Essentials should become de facto standard for doing business in the UK, says APMG.
AlienVault says that technology industry veteran Mike Bennett will join the company’s...
Traditionally a technique of the most talented hackers, automated SQL attack tools are putting...
Criminals are rapidly evolving their hacking techniques, and are attacking quickly, making timely...
Growth in worldwide cloud-based security services will remain strong, reaching $5.9 billion in...
Despite 71% believing UK data protection laws should be stronger, 53% still admit to sending...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more