NEWS

A UK business will spend more than ?1m recovering from a data security breach

The cost of recovering from of a security breach for UK organisations has been estimated in a new report launched by NTT Security, the specialised security company of NTT Group.

Read More

NEWS

Research shows the rise of the machines in the fight against cybercrime

Biometric-based authentication is set to become more prevalent in the UK, as over half (53%) of organisations expect to significantly increase their investment in biometric technologies.

Read More

NEWS

Concerns about resources gaps and effectiveness of senior management

Security BSides, the community-driven event built for and by information security community members, has published the results of its Security BSides London Attendees Survey 2017, co-ordinated by Digital Guardian. The survey collected responses from 187 full-time security industry professionals attending the London event, with a view to getting an insider’s outlook on the current cyber security climate.

Read More


Millions oblivious to serious hacking risk

Millions are at serious risk of hacking and don’t know it – with fitness trackers, smart TVs and even children’s toys among the most vulnerable items, according to new research from consumer security specialist, BullGuard.

Read More


30% of senior executives are concerned about how companies in their sector manage and store their...
Response and recovery have significant impact on 58% of targeted businesses.
Human error is the top cause of serious breaches but malicious attacks are IT leaders’ biggest...
Gemalto has announced the availability of its SafeNet ProtectV solution on the Azure Marketplace,...
Chris Marrison, consulting solutions architect at Infoblox, discusses the importance of checking...
By Steve Harcourt, Senior Information Security Consultant, Redstor.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more