ISACA issues first audit programs aligned with COBIT 5

Global IT association ISACA has issued five new audit programs—the first of more than 30 audit programs that will align with COBIT 5. The new audit/assurance programs released today provide assurance over the governance domain processes:

Read More
AlienVault continues rapid expansion of Open Threat Exchange

AlienVault™ has announced continued momentum behind its Open Threat Exchange™ (OTX) initiative with the addition of new partners Cegeka, GoGrid, Netflow Logic, Onsight, Risk I/O and ThreatStop. In addition, the integration of AlienVault’s OTX into Spiceworks has helped IT...

Read More
Lessons learnt from blocking millions of cyber attacks

FireHost has announced the release of its 2013 year in review Superfecta report (available for download here link and by request). Using real-life data from the 100m+ malicious hack attempts FireHost blocked in the last 12 months, the Superfecta report contains a quarter-by-quarter guide to the...

Read More
DNA to detect pass-the-hash vulnerabilities

CyberArk has unveiled the latest version of Discovery & Audit (DNA), said to be the first tool on the market to identify and map exposed privileged password hashes and all related vulnerable machines on a network. CyberArk DNA is a patent-pending, light-weight, stand alone tool that exposes the...

Read More
Bit9 partners with Check Point Software Technologies

Bit9 and Check Point® Software Technologies Ltd. has announced a partnership to integrate the...

Read More
More than 575 million data records lost or stolen in 2013

Over 1.5 million data records were lost or stolen every day in 2013.

Read More
St.LukesHealth sees clearly with Varonis

Private health insurance provider knows if an unauthorised user tries to access its sensitive...

Read More
AlgoSec partners with Qualys

New integration delivers application-centric vulnerability management, aggregating and scoring...

Read More
New US Cybersecurity Framework developed by NIST features COBIT 5 in the core

ISACA’s COBIT 5 is included as an informative reference in the core of the US Cybersecurity...

Read More
Lancope introduces StealthWatch Labs security updates

Security updates from Lancope’s research team help customers combat today’s...

Read More
Tech Data promotes Andy Gass

Tech Data says that Andy Gass will become Managing Director UK and Ireland, after spending the past...

Read More
Das Netzwerk als Business Enabler:Cloud-basierte Sicherheitslösungen machen’s möglich

Internetsicherheit ist in den letzten Jahren immer mehr zu einem beweglichen Ziel geworden. Das...

Read More
Tangible business returns from formalised mobility strategies

Global survey of business and IT decision makers reveals that special class of “mobile...

Read More
Get chooses Proact

Get services and equipment which have been outsourced to a third party up to now are being brought...

Read More
Logicalis completes IT overhaul for Birmingham City University

Logicalis has completed a comprehensive IT infrastructure overhaul for Birmingham City University....

Read More

Videos

Maxime Vermeir, Senior Director of AI Strategy at ABBYY, discusses the results from ABBYY’s State of Intelligent Automation: GenAI Confessions 2025 survey, which reveals challenges in implementing Generative...
Data Centre World Asia 2025
Data Centre World Asia 2025
Rob Lay, Cisco, discusses the results from the third annual Cisco AI Readiness Index. A small but consistent group of companies surveyed — the ‘Pacesetters,’ about 13% of organizations for the last three...

Expert Opinions

In Houston’s industrial sector, Champion Machine Tools has long been known for precision manufacturing, fast turnaround, and the kind of craftsmanship that keeps America’s supply chains running. But as...
By Dmitry Panenkov, CEO and Founder of emma, the cloud management platform.