Do private details belong in the Cloud?

In recent weeks, plans to transfer the medical records of everyone in England to a central NHS database have been met with controversy. Patients have not been informed, trust in the IT systems is waning, and medical and privacy organisations alike have expressed their apprehension, resulting in NHS England announcing a six-month delay in action.

Read More


More than 1 in 8 IT security pros can access previous employers’ systems using old credentials

Just over 13 percent of IT security professionals admit to being able to access previous employers’ systems using their old credentials, a new survey from Lieberman Software Corporation reveals.

Read More

Worldwide Threat Intelligence Security Services spending to exceed $1.4 billion by 2018

A consistent bombardment of unknown, targeted, and adaptive cyber threats are wreaking havoc in the enterprise and driving the expansion of threat intelligence security services (TISS) that are specifically designed to detect advanced persistent threats (APTs), advanced malware, and previously unidentified attacks. According to new research from International Data Corporation (IDC), worldwide threat intelligence security services spending will increase from $905.5 million in 2014 to more than...

Read More



Proofpoint has published its annual Human Factor report findings, which details how cyberattackers...
Sophos has acquired Braintrace, further enhancing Sophos’ Adaptive Cybersecurity Ecosystem with...
Security challenges can only be met with a steadfast commitment to improving cyber security...
Leaving data in an insecure location, failure to redact or bcc, and emailing the wrong person cited...
ABP Food Group, Europe's leading beef processor and private label pet food producer, has turned to...
Nearly two thirds (65%) of finance organisations are already prepared or preparing for an...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more