ForgeRock Identity Platform addresses evolving customer data privacy regulations

ForgeRock has introduced its newest identity management platform, including an implementation of the User-Managed Access (UMA) standard. Built on consent-by-default and consent-by-design principles, the ForgeRock Identity Platform™ is the first identity management platform to support an UMA implementation designed for consumer consent and data sharing purposes.

Read More

Cyber startup initiative

A new programme to support cyber security startups will help develop innovative technical solutions that will help keep the UK safe from cyber attacks, the UK Government has announced.

Read More

Tenable Network Security supports Microsoft Azure

Leading developer of next-generation cybersecurity software now provides enhanced security visibility across three major cloud environments with release of Nessus for Microsoft Azure.

Read More

Check Point introduces new appliance series

15000 and 23000 Series appliances introduce full threat prevention to help keep enterprises one step ahead of costly cyberattacks without compromising performance.

Read More


Lack of confidence in securing mobile payment methods

54% of surveyed IT professionals said their companies had a data breach involving payment data, four times in past two years in average.

Read More

Wick Hill appointed distributor for Guidance Software - a world leader in digital forensics, cyber...
Trend Micro-ESG study calls for appointment of Business Information Security Officers.
By Steve Hammond, President of Fiberlink International.
Staff burnout and a shortage of IT skills could weaken Britain’s defence against attacks on...
Study reveals 48% of people will close accounts following a data breach.
Nominet has published its Cyber Security and the Cloud research, finding that 61 percent of...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more