More endpoints mean more security

The two most transformative trends impacting IT service providers (ITSPs) are endpoint growth and demand for security services according to a new Autotask survey of more than 1,100 global ITSPs.

Read More

Federated first?

Cloud-based security solution minimises an organisation’s attack surface by governing and securing federated access by outsourced IT, vendors and other third parties.

Read More


NEWS

2016 – the rise of the cyber security and data breach reporting officer

A leading crime lawyer predicts 2016 to be the year where organisations appoint dedicated cyber security and data breach reporting officers as part of their legal compliance obligations.

Read More

Connected visibility

Pwnie Express, provider of real-time threat detection of all the wireless and wired devices in and around workplaces, has announced European availability of its Pwn Pulse SaaS platform. European organizations can now detect rogue, misconfigured, and unauthorized devices, from phones and printers to malicious access points, across wired and wireless spectrums. Visibility from Pwn Pulse helps European companies more comprehensively protect critical business infrastructure while...

Read More

Looking to the sky: drones, cloud and IoT are the new frontiers for cyber security

A10 Networks suggests that we look to the sky to prepare for our defence, as drones, cloud and Internet of Things are the new frontiers for new cyber security threats.

Read More

FireMon has released its 2020 State of Hybrid Cloud Security Report, the annual benchmark of the...
By Robert Doswell, managing director of Tools4ever UK, a global provider of identity and access...
US pipeline cyberattack is a ‘timely reminder’ highlighting the need for cyber insurance,...
State of Industrial Cybersecurity report reveals only 21% of organizations achieved full maturity...
A study conducted by MIT Technology Review finds that 96% of security leaders are now preparing for...
Zero trust technologies that enable seamless, secure user authentication are critical; 6 in 10...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more