NEWS

Companies left in the dark as two-thirds admit cloud apps being implemented without their knowledge

More than two-thirds (67 per cent) of organisations admit that unauthorised cloud applications are being implemented without IT’s knowledge or involvement, and correspondingly pose a security risk to the business. This is according to a snapshot poll by Centrify, the leader in unified identity management across cloud, mobile and data centre, at Cloud Expo Europe last week in London.

Read More

NEWS

AlienVault Partners with T-Systems and Deutsche Telekom

AlienVault is partnering with Deutsche Telekom and T-Systems, the ICT division of Deutsche Telekom, to provide ‘German Mittelstand’ mid-market customers with the ability to detect and mitigate the impact of a breach.

Read More

NEWS

Imation unveils Secure Data Movement Architecture

Imation’s SDMA offers organizations and users a holistic approach to manage and protect an organization’s most valuable data from tampering, destruction, loss or leakage.

Read More



Enterprise Immune System technology to be integrated in BT’s security offerings

BTis integrating technology from Darktrace, one of the world’s fastest growing cyber threat defence companies, to deliver next-generation cyber threat detection and intelligence services to the global market.

Read More

Addressing cloud security challenges through Fujitsu Managed Security Services.
The Information Commissioner’s Office (ICO) has published a new security report highlighting...
Good’s secure container solution provides the answer for global insurance provider to replace...
NetApp survey shows that visibility into cloud usage and spending are still major concerns; only...
By Steve Harcourt, Senior Information Security Consultant, Redstor.
BeyondTrust and Thales provide customers comprehensive security to control passwords, protect...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more