Companies need to stop divorcing themselves from cyber security

The 2015 Data Protection Best Practices and Risk Assessment Guides has revealed that in January to June last year over 30 per cent of data breaches involving the loss of personally identifiable information (PII) were caused by internal intrusions -- while a further 29 per cent were caused either accidentally or maliciously by employees. Richard Pharro, CEO of APM Group, gives his opinions on the issue.

Read More



New report helps Victims Service Alliance organisations meet data protection challenge

The Information Commissioner’s Office (ICO) has published a report highlighting how organisations attached to the Victims Services Alliance (VSA) are looking after people’s information in compliance with the Data Protection Act (DPA). 

Read More


IT resilience more important than ever as the demand for data expands across all platforms

Vision Solutions Inc. has announced its Seventh Annual State of Resilience Report. Entitled “The Future of IT: Migrations, Protection & Recovery Insights,” the report highlights trends, opportunities and challenges for IT and business leaders alike. In addition, the company will conduct a live webcast on Jan. 22 detailing the results of the research.

Read More

Cloud security strategy protects sports organization’s email, ensures PCI compliance and...
Security operations teams face challenges in understanding how their security tools work leading to...
Centrify has been awarded the Skyhigh CloudTrust™ rating of Enterprise-Ready for its Centrify...
Collaboration provides real-time protection against undiscovered threats, zero-day and targeted...
Defence-grade solution brings improved visualisation, more advanced analytics and simplified data...
“State of Ransomware Readiness: Facing the Reality Gap” finds surveyed organizations are...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more