More endpoints mean more security

The two most transformative trends impacting IT service providers (ITSPs) are endpoint growth and demand for security services according to a new Autotask survey of more than 1,100 global ITSPs.

Read More

Federated first?

Cloud-based security solution minimises an organisation’s attack surface by governing and securing federated access by outsourced IT, vendors and other third parties.

Read More


NEWS

2016 – the rise of the cyber security and data breach reporting officer

A leading crime lawyer predicts 2016 to be the year where organisations appoint dedicated cyber security and data breach reporting officers as part of their legal compliance obligations.

Read More

Connected visibility

Pwnie Express, provider of real-time threat detection of all the wireless and wired devices in and around workplaces, has announced European availability of its Pwn Pulse SaaS platform. European organizations can now detect rogue, misconfigured, and unauthorized devices, from phones and printers to malicious access points, across wired and wireless spectrums. Visibility from Pwn Pulse helps European companies more comprehensively protect critical business infrastructure while...

Read More

Looking to the sky: drones, cloud and IoT are the new frontiers for cyber security

A10 Networks suggests that we look to the sky to prepare for our defence, as drones, cloud and Internet of Things are the new frontiers for new cyber security threats.

Read More

US pipeline cyberattack is a ‘timely reminder’ highlighting the need for cyber insurance,...
IT decision makers are facing major challenges between dynamic adversaries, significant legislation...
Onfido’s trusted identity verification to power onboarding for Microsoft’s new digital wallet...
As we approach a year of what has now become out-of-office working, cybersecurity continues to be...
Netwrix report reveals that concern about data theft by employees and IT admin mistakes has soared...
Hidden Data Economy report exposes price points for stolen data bought and sold in cybercriminal...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more