Report outlines distinctive national and regional characteristics of nation-state driven cyber attacks

FireEye, Inc. has announced the release of a report titled, “World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks” that describes the unique international and local characteristics of cyber attack campaigns waged by governments worldwide.

Read More
White Paper ‘quashes’ EMEA data protection law myths

Dell SecureWorks has launched a white paper which seeks to overturn the myths surrounding data protection laws and how organisations can use Managed Security Service Providers (MSSP). In conjunction with law firm Field Fisher Waterhouse, experts in data protection and data security law, Dell...

Read More
Small businesses warned about importance of encryption, after London sole trader fined £5,000

The Information Commissioner’s Office (ICO) has warned small businesses that they must make sure they have adequate measures in place to keep customers’ details secure, after a sole trader was fined £5,000.

Read More
Insurance Giant Allianz partners with Incoming Thought

Cyber crime and data breaches are considered one of the top emerging risks for the 21st century and...

Read More
ICO carries resolution encouraging greater co-ordination of global data protection enforcement

The Information Commissioner’s Office (ICO) has won a resolution in Warsaw which is set to...

Read More
Employees causing security threats

Nearly 30% of employees are using personal cloud services to store work-related documents,...

Read More
UK companies getting better at cyber security

The number of security incidents detected by UK companies in the past 12 months is almost three...

Read More
IT security and risk managers divided over role of compliance within customer contact operations

Sabio interviews reveal organisations still struggling to find the right balance between ensuring...

Read More
Becrypt extends Enterprise Data Protection strategy with new secure file sharing solution

Becrypt mShare addresses the growing demands and conflicts that data leakage prevention is placing...

Read More
Security best practice guidelines

McAfee and the Digital Government Security Forum (DGSF) release a new report which explores the...

Read More
Commercial data security getting tougher as cyber attacks get super-smart

Cyber criminals are systematically testing businesses digital defences in order to steal financial...

Read More
Virtual Panda thrives in the cold

Logistics provider Peter Green Chilled offer Temperature Controlled services to the food industry...

Read More
100% of commuters put company data at risk over free public Wi-FI

Commuter study reveals commuters regularly connect to free, unsecure Wi-Fi services during their...

Read More
ISACA releases “Configuration Management: Using COBIT 5” to help businesses manage change

Change can cause business disruptions, inefficiencies and financial losses. Proper configuration...

Read More

Videos

Andy Bevan, Head of Propositions and Strategy Consulting at Daisy Corporate Services, discusses recent research findings which reveal that two-thirds of IT leaders say that legacy infrastructure is creating a...
Chris McKie, VP, Product Marketing Networking, Security & Risk Management Solutions, Kaseya, discusses the findings of the company’s recently published 2024 MSP Benchmark Report, with automation,...
David Williams, Acting Managing Director EMEA, Telstra International, and Kwee Chuan Yeo, Senior Editor, Asia, MIT Technology Review Insights, discuss the findings of a recent MITTR study focusing on AI. It...
Steve Haskew, Head of Sustainability and Social Leadership at Circular Computing, explains how the road to Net Zero almost certainly involves organisations considering their IT estate, especially in terms of...

Expert Opinions

By Ram Chakravarti, chief technology officer, BMC Software.
By Brian Sibley, Solutions Architect, Espria.
By Andy Baillie, VP, UK&I at Semarchy.