Gemalto launches M2M Cat 1 LTE module

Gemalto is launching a leading edge M2M Category 1 (Cat 1) LTE wireless module. This advanced module enables fall-back to 2G in Europe Middle East Africa and to 3G in North America for areas where LTE connectivity is not yet fully available.

Read More
NEWS
Social engineering leads the list of most popular hacking methods

The recent data breach of 10,000+ Departments of Justice and Homeland Security staff and over 20,000 supposed Federal Bureau of Investigation (FBI) employees is another example that becoming an insider by using social engineering tactics is much easier for hackers than writing...

Read More
NEWS
Cybersecurity pros face increased pressures

Trustwave has released the 2016 Security Pressures Report, based on a survey of 1,414 in-house information security professionals, which shows a rise in both the current and expected pressures in the career field and offers ways for security professionals globally to mitigate the increasing...

Read More
Eliminating security silos

Company delivers new product capabilities to boost enterprise worker productivity via secure...

Read More
Barracuda enhances Web Application Security portfolio

Barracuda has introduced the new Barracuda Vulnerability Manager, a cloud-based service to help...

Read More
NEWS
70% of world population will be mobile users

Since 2000, when the first camera phone was introduced, the number of mobile users has...

Read More
The rise of the digital ransomware business

AppRiver’s Global Security Report shows business is booming for online extortionists.

Read More
ForgeRock Identity Platform addresses evolving customer data privacy regulations

ForgeRock has introduced its newest identity management platform, including an implementation of...

Read More
Cyber startup initiative

A new programme to support cyber security startups will help develop innovative technical...

Read More
NEWS
Rendering stolen data useless to hackers

Timely move given the increasing frequency of devastating attacks globally as the kit allows...

Read More
NEWS
Report highlights business confusion amid rising cyber threats

More executives state responsibility for data security should reside outside of IT.

Read More
Lack of confidence in securing mobile payment methods

54% of surveyed IT professionals said their companies had a data breach involving payment data,...

Read More
Security and innovation driving transformation of the CIO

Insight research highlights growing importance of IT in the workplace with 8 in 10 business...

Read More
Bromium and NTT Com Security form global security partnership

Bromium and NTT Com Security have formed a strategic global partnership to deliver Bromium’s...

Read More

Videos

Irvin Shillingford - Regional Manager Northern Europe at Hornetsecurity, discusses the results from the company's annual Ransomware Impact Report, with a rise in ransomware attacks the headline finding. Irvin...
Scott Constable, Alliance Director at Vespertec, John Griffith, Worldwide Sales Manager at Midas Immersion Cooling and Dr. George Zhang, Vice President of R&D at Valvoline Global, discuss the three...
Mark Wilson, CEO of ILI Group, discusses the ILI Group’s plans for three new hyperscale data centres across Scotland, creating what it calls The Stoics – a £15 billion Green Digital Network spanning the...
CEO Dave Gerry, and Dr David Brumley, Chief AI and Science Officer, both at Bugcrowd, discuss the findings of the recent “Inside the Mind of a CISO 2025: Resilience in an AI-Accelerated World” report,...

Expert Opinions

By Graham Jarvis, Freelance Business and Technology Journalist.
By Jon Fielding, Managing Director, EMEA, Apricorn.
Straightline Consulting’s Craig Eadie discusses how the rapid rise of hyperscale and AI-driven data centres is amplifying project complexity and risk, and why comprehensive commissioning from day one is now...
By Buddie Ceronie, GM for Telecommunications, VertiGIS.