How to implement the US Cybersecurity Framework

The technology that supports and protects an organization’s information is increasingly advanced and connected. It is also increasingly under attack. Earlier this year, the National Institute of Standards and Technology released the US Cybersecurity Framework (CSF) to help critical infrastructure providers. Now, new guidance from ISACA, an association of 115,000 global technology and business professionals, helps organizations of all sizes and in all industries use the CSF.

Read More

Security breaches can go undiscovered for weeks

Tripwire, Inc has announced the results of a survey of 215 attendees at the Black Hat USA 2014 security conference in Las Vegas, Nevada.

Read More


IT professionals lack confidence to manage governance, risk and compliance

Dell Software survey shows nearly 100 percent of respondents in finance, retail and healthcare industries are worried about capability to meet compliance objectives.

Read More

Only one in a 100 Cloud providers meet proposed EU Data Protection requirements

The EU General Data Protection Regulation is expected to be passed this year and take effect in 2015 but new research from cloud visibility and enablement company, Skyhigh Networks, suggests that only 1 in 100 cloud providers meets these requirements to date.

Read More


Findings reveal that 37% of respondents have reported an incident to the ICO in the past 12 months,...
Research shows ‘game needs to be changed,’ with security innovation years behind that of the...
Company introduces new automation offering, InsightConnect; and provides enhanced automation...
Almost half (47%) of UK CIOs and CTOs will add extra IT security personnel to their teams in 2015...
New CTO and Marketing VP extend management vision to help fuel future expansion.
By Chris Marrison, EMEA Technical Director, Infoblox.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more