Shadow IT lurks uncomfortably, for IT departments

The growth in ‘Shadow IT’ is leaving IT departments caught between a rock and a hard place, according to Simon Bain, CTO of search specialists, Simplexo, who suggests that the concerns existing around managing unsupported devices are equally matched by the need to bring IT expenditure in on budget.

Read More

New survey highlights worrying lack of guidance from employers on use of personal devices

A survey commissioned by the Information Commissioner’s Office (ICO) has shown many employers appear to have a ‘laissez faire’ attitude to allowing staff to use their personal laptop, tablet computer or smartphone for work business, which may be placing people’s personal information at risk.

Read More



Trustwave opens Security Operations Center in Asia Pacific

Trustwave has opened a new Security Operations Center (SOC) in Manila, the capital of the Philippines, to meet client needs and support the growth of Trustwave’s Managed Security Services. The new Security Operations Center enhances Trustwave’s ability to serve clients headquartered in Asia Pacific, in addition to large, multinational businesses with operations in the region.

Read More

Ipswitch File Transfer announces WS_FTP Server 7.6

Adds enhanced security, database support and customisation capabilities to industry-leading file transfer server.

Read More

Biometric-based authentication is set to become more prevalent in the UK, as over half (53%) of...
Underwriters and brokers have been warned the vast majority of UK businesses are unprepared to...
Ivanti has published new findings from a survey studying the impact of the move to “work from...
Ground-breaking study, commissioned by Bromium, highlights emergence of Platform Criminality,...
Chris Goettl, Vice President, Product Management at Ivanti, reports that Microsoft has resolved a...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more