How to implement the US Cybersecurity Framework

The technology that supports and protects an organization’s information is increasingly advanced and connected. It is also increasingly under attack. Earlier this year, the National Institute of Standards and Technology released the US Cybersecurity Framework (CSF) to help critical infrastructure providers. Now, new guidance from ISACA, an association of 115,000 global technology and business professionals, helps organizations of all sizes and in all industries use the CSF.

Read More

Security breaches can go undiscovered for weeks

Tripwire, Inc has announced the results of a survey of 215 attendees at the Black Hat USA 2014 security conference in Las Vegas, Nevada.

Read More


IT professionals lack confidence to manage governance, risk and compliance

Dell Software survey shows nearly 100 percent of respondents in finance, retail and healthcare industries are worried about capability to meet compliance objectives.

Read More

Only one in a 100 Cloud providers meet proposed EU Data Protection requirements

The EU General Data Protection Regulation is expected to be passed this year and take effect in 2015 but new research from cloud visibility and enablement company, Skyhigh Networks, suggests that only 1 in 100 cloud providers meets these requirements to date.

Read More


Cyber crime and data breaches are considered one of the top emerging risks for the 21st century and...
Atos, a global leader in digital transformation, believes waiting for digital threats to...
Forcepoint Dynamic User Protection brings mainstream UAM and insider threat protection with...
CA Technologies has introduced new data protection enhancements to CA Data Content Discovery and...
40% of IT professionals view Operations teams as the biggest risk to security, above malware and...
Partnership drives proactive security approach inside global organisations, closes detection...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more