Ex-employees have access to confidential data up to a week or more after leaving a company

One in three say it is ‘easy’ for ex-employees to access systems or information with old passwords.

Read More
DDoS attacks damage customer confidence and revenues

More than half of IT security professionals (52 percent) said loss of customer trust and confidence were the most damaging consequences of DDoS attacks for their businesses, according to new research from Corero Network Security.

Read More
Bromium will enhance Windows 10’s Advanced Security with micro-virtualization

Bromium and Microsoft collaborate to ensure Bromium security solutions are supported on Windows 10, delivering the World’s Most Secure Endpoint to help eliminate enterprise breaches.

Read More
NTT Com Security and Fortinet form global security partnership

NTT Com Security and Fortine have entered into a formal partnership to provide expert security...

Read More
Organisations spend half a million pounds, annually, dealing with false positive alerts

A report from The Ponemon Institute reveals that two-thirds of the time spent by security staff...

Read More
Check Point teams with VMware

Check Point vSEC integrates with VMware NSX for dynamic orchestration of advanced threat prevention...

Read More
Palo Alto Networks, Cisco and Dell are top vendors for intrusion detection and prevention

AirWatch by VMware and Mobile Iron lead adoption for security capabilities in the Enterprise...

Read More
Fortinet closes acquisition of Meru Networks

Fortinet has closed the acquisition of Meru Networks. With the close of this acquisition, Fortinet...

Read More
Defence driven by understanding the attacker’s mindset

MWR InfoSecurity launches Countercept service – to catch a thief it has to think like one.

Read More
How to be a security policy management saint, not a sinner

The path to policy righteousness demands the right processes, visibility and automation – but...

Read More
Bitdefender signs MSP partnership deal with Blue Solutions

Security solutions provider has joined forces with established software distributor to protect...

Read More
Bolstering enterprise visibility into threats and vulnerabilities

Trustwave has carried out a major enhancement to the company’s managed security services...

Read More
Etihad Airways chooses Okta to provide Identity Management Services in the cloud

Etihad Airways makes significant technology investment with Okta to drive innovation through...

Read More
Small businesses in the dark about cyber security

More than half of small businesses in the UK are unprepared for data breaches, CSID survey finds...

Read More

Videos

Dan Evans, Associate Director at Lichfields, discusses the results of the company’s recent data centre study, which finds that, for developers, Scotland offers something few regions or countries can match -...
Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.

Expert Opinions

By Derek Thompson, Senior VP & GM, EMEA, Workato.
BAC specializes in cooling for the future, providing a system solution for data centers that combines immersion cooling with dry, adiabatic, hybrid and/or evaporative cooling options.
By Manvinder Singh, VP of Product Management for AI at Redis.