Five reasons for including secure workspaces in BYOD deployments

Dell advocates the use of secure enterprise workspaces in BYOD environments to help organisations balance employee expectations, business goals, IT requirements and security needs. Today, a plethora of options exist for providing employees with the software and other enterprise resources needed to do their jobs. A secure workspace, however, is the most effective approach for accommodating employees’ needs for anywhere, anytime access to corporate data and resources while also elevating...

Read More

Use the new EU Data Protection reforms to secure funding for IT security, says Databarracks

The EU is to impose new data protection legislation to ensure better protection of the personal information of all EU citizens. The reforms will come with more severe fines for organisations that suffer data breaches. Peter Groucutt, managing director at Databarracks, claims that this is the tool IT professionals can use to drive-through security changes, as failure to do so will now result in severe repercussions: “Often, the fines imposed on organisations that suffer data breaches are...

Read More

Elitetele.com launches managed firewall services to help firms secure increasingly complex IT landscape

Elitetele.com has introduced a suite of unified threat management (UTM) solutions, including next generation firewalls, for IT teams struggling to secure a rapidly-evolving IT landscape.

Read More

Blue Coat reveals security risks from “One-Day Wonders” websites

Blue Coat Systems, Inc. says that 71 percent of hostnames appeared for just 24 hours. While the majority of these “One-Day Wonders” are the backbone for how Internet content is shared and delivered, the sheer volume provides cover for malicious activity, including communication to infected systems.

Read More

Finance sector vulnerable to insider threats as workers share passwords despite awareness of risks

A quarter of finance sector workers state they are frustrated with employer security policy, with one in ten admitting they actively attempt to circumvent it.

Read More


Neustar’s Online Domain Maturity report reveals outsourcing to be most effective route to...
Ready availability of hacking tools, wildfire spread of malware and proliferation of cryptomining...
Lack of qualified staff named second biggest challenge with user access and vulnerability...
Sophos hasannounced additions to its range of SG Series firewall/UTM appliances, WiFi access...
Nearly 10% of UK companies don’t know how many security breaches they have suffered in the...
As IT spend moves to line of business managers, and with more than half spending at least 70% of...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more