How to implement the US Cybersecurity Framework

The technology that supports and protects an organization’s information is increasingly advanced and connected. It is also increasingly under attack. Earlier this year, the National Institute of Standards and Technology released the US Cybersecurity Framework (CSF) to help critical infrastructure providers. Now, new guidance from ISACA, an association of 115,000 global technology and business professionals, helps organizations of all sizes and in all industries use the CSF.

Read More

Security breaches can go undiscovered for weeks

Tripwire, Inc has announced the results of a survey of 215 attendees at the Black Hat USA 2014 security conference in Las Vegas, Nevada.

Read More


IT professionals lack confidence to manage governance, risk and compliance

Dell Software survey shows nearly 100 percent of respondents in finance, retail and healthcare industries are worried about capability to meet compliance objectives.

Read More

Only one in a 100 Cloud providers meet proposed EU Data Protection requirements

The EU General Data Protection Regulation is expected to be passed this year and take effect in 2015 but new research from cloud visibility and enablement company, Skyhigh Networks, suggests that only 1 in 100 cloud providers meets these requirements to date.

Read More


Integration of Dell’s identity governance and privileged management solutions provides a...
European countries lead the world in IPv6 adoption.
2014 was a year in which information security vaulted into the public eye, driven by a surge in...
IT decision-makers report inadequate levels of sponsorship from the C-suite despite the General...
Alert Logic and Prelert have announced an OEM partnership enabling Prelert’s machine learning...
From passwords and the IoT to nation state cyber warfare and jumping mobile malware, WatchGuard...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more