NEWS

Data leakage attacks almost double

Cybersecurity leader recommends greater focus on data security as ICO data breach fines rise 20-fold.

Read More

NEWS

Communications 'chaos' causes security stress

‘There’s a threat, pass it on’: a negative communication cycle between vendors, IT leaders and employees leaves enterprises at risk.

Read More


NEWS

The cloud security conundrum

While 91% of organisations were successful in increasing security as a result of adopting cloud services, it remains a top concern for many. This finding comes from part two of the four-part Cloud Impact Study from Aptum, the global hybrid multi-cloud managed service provider. The report, titled The Security and Compliance Barricade, identifies common security, compliance and governance challenges impacting organizations undergoing cloud transformation.

Read More


NEWS

Organisations continue to make risky remote decisions

As we approach a year of what has now become out-of-office working, cybersecurity continues to be top of the agenda for businesses. With people spread across the nation, and in some cases the globe, many have opted for Endpoint Detection Response (EDR) solutions to protect their dispersed device networks and keep companies safe.

Read More

New report looks at why these low-volume attacks are so costly, and how to protect your business...
Infoblox has launched Infoblox Identity Mapping, which bridges the gap between network security and...
A new industry study has revealed that a shocking 46 per cent of IT managers are not aware of PBX...
Commuter study reveals commuters regularly connect to free, unsecure Wi-Fi services during their...
New Group wide initiative will enable organisations to embrace digital transformation securely.
Over-stretched IT security pros spend more time fire-fighting than doing meaningful security work.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more