NEWS

Data leakage attacks almost double

Cybersecurity leader recommends greater focus on data security as ICO data breach fines rise 20-fold.

Read More

NEWS

Communications 'chaos' causes security stress

‘There’s a threat, pass it on’: a negative communication cycle between vendors, IT leaders and employees leaves enterprises at risk.

Read More


NEWS

The cloud security conundrum

While 91% of organisations were successful in increasing security as a result of adopting cloud services, it remains a top concern for many. This finding comes from part two of the four-part Cloud Impact Study from Aptum, the global hybrid multi-cloud managed service provider. The report, titled The Security and Compliance Barricade, identifies common security, compliance and governance challenges impacting organizations undergoing cloud transformation.

Read More


NEWS

Organisations continue to make risky remote decisions

As we approach a year of what has now become out-of-office working, cybersecurity continues to be top of the agenda for businesses. With people spread across the nation, and in some cases the globe, many have opted for Endpoint Detection Response (EDR) solutions to protect their dispersed device networks and keep companies safe.

Read More

SolarWinds has announced the results of a survey- looking into the mobile security challenges faced...
Kaseya( has introduced Kaseya AuthAnvil On-Demand, its cloud-based identity and access management...
Analysis of millions of users, devices and apps shows organizations implementing zero-trust...
Retail, together with education, faced the highest level of ransomware attacks during 2020, with...
Swiss data centre confronts customer fears of government snooping with increased levels of data...
OPSWAT acquires Red Earth Software, extending its advanced threat prevention technology to protect...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more