Tier-3 builds on strengths in analytics, compliance, automation and incident response

New real-time Governance, Risk and Compliance dashboards deliver live, continuous compliance and security status view for business stakeholders.

Read More


76 per cent of UK IT pros rank their security above average

SolarWinds has released the results of its Information Security Confidence Survey, which explored IT professionals' confidence in their organisations' security measures and processes. The survey found that while confidence is notably high, likely the result of several key factors, widespread adherence to security best practices is lacking and significant, damaging attacks continue, potentially indicating this confidence is a false sense of security.

Read More

Verizon identifies key enterprise technology trends for 2015

Strategic network investments will be a major focus point for savvy CIOs in 2015, as companies seek to make sense of big data, transition to the cloud and monetize the Internet of Things (IoT), according to Verizon Enterprise Solutions’ list of top enterprise technology trends for 2015. In the coming year, enterprise organizations will also adopt technologies that drive business innovation and provide a strong platform for future growth.

Read More



Seventy-nine percent of IT security professionals report to executive management on compliance, yet...
Juniper Networks has announced Juniper Argon Secure, an advanced anti-malware service for Juniper...
Security BSides, the community-driven event built for and by information security community...
Spiceworks has announced a series of updates that simplify how more than 4 million IT professionals...
A new report published by CREST looks for solutions to the increasing problems of stress and...
Research suggests UK companies will be using IT services providers the most to overcome hurdles in...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more