Tier-3 builds on strengths in analytics, compliance, automation and incident response

New real-time Governance, Risk and Compliance dashboards deliver live, continuous compliance and security status view for business stakeholders.

Read More


76 per cent of UK IT pros rank their security above average

SolarWinds has released the results of its Information Security Confidence Survey, which explored IT professionals' confidence in their organisations' security measures and processes. The survey found that while confidence is notably high, likely the result of several key factors, widespread adherence to security best practices is lacking and significant, damaging attacks continue, potentially indicating this confidence is a false sense of security.

Read More

Verizon identifies key enterprise technology trends for 2015

Strategic network investments will be a major focus point for savvy CIOs in 2015, as companies seek to make sense of big data, transition to the cloud and monetize the Internet of Things (IoT), according to Verizon Enterprise Solutions’ list of top enterprise technology trends for 2015. In the coming year, enterprise organizations will also adopt technologies that drive business innovation and provide a strong platform for future growth.

Read More



Zycko has announced a new relationship with ObserveIT. A pioneer in user activity monitoring,...
Alert Logic has published the results of a survey conducted amongst 317 security professionals...
Zadara says that its award-winning Zadara Storage Cloud and VPSA® services adhere ...
Sophos has published findings from its survey report, “The State of Ransomware in Financial...
Intel Security has appointed Andrew Elder to the position of president of EMEA operations. In this...
Behavior-based authentication, state-sponsored cyber terrorism and IoT regulations top the list of...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more