How to implement the US Cybersecurity Framework

The technology that supports and protects an organization’s information is increasingly advanced and connected. It is also increasingly under attack. Earlier this year, the National Institute of Standards and Technology released the US Cybersecurity Framework (CSF) to help critical infrastructure providers. Now, new guidance from ISACA, an association of 115,000 global technology and business professionals, helps organizations of all sizes and in all industries use the CSF.

Read More

Security breaches can go undiscovered for weeks

Tripwire, Inc has announced the results of a survey of 215 attendees at the Black Hat USA 2014 security conference in Las Vegas, Nevada.

Read More


IT professionals lack confidence to manage governance, risk and compliance

Dell Software survey shows nearly 100 percent of respondents in finance, retail and healthcare industries are worried about capability to meet compliance objectives.

Read More

Network monitoring solution heals network ailments at The Cambridge School of Clinical Medicine

The School of Clinical Medicine will implement WhatsUp Gold network monitoring solution from Ipswitch to monitor its expanding IT infrastructure. The school is one of six based across the Cambridge University campus and is linked to Addenbrooke’s teaching hospital.

Read More


Phishing attacks are regarded as the greatest cyber threat.
NTT Security report shows finance knocks business and professional services off top spot in four...
Includes increased code-scanning speed and new functionality to complement agile development.
Trustwave has released the 2016 Trustwave Global Security Report which reveals the top...
Anomali has published the results of a Ponemon Institute study revealing that 70 percent of...
Ongoing investment in senior appointments as company expands offensive security and managed...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more