Companies need to stop divorcing themselves from cyber security

The 2015 Data Protection Best Practices and Risk Assessment Guides has revealed that in January to June last year over 30 per cent of data breaches involving the loss of personally identifiable information (PII) were caused by internal intrusions -- while a further 29 per cent were caused either accidentally or maliciously by employees. Richard Pharro, CEO of APM Group, gives his opinions on the issue.

Read More



New report helps Victims Service Alliance organisations meet data protection challenge

The Information Commissioner’s Office (ICO) has published a report highlighting how organisations attached to the Victims Services Alliance (VSA) are looking after people’s information in compliance with the Data Protection Act (DPA). 

Read More


IT resilience more important than ever as the demand for data expands across all platforms

Vision Solutions Inc. has announced its Seventh Annual State of Resilience Report. Entitled “The Future of IT: Migrations, Protection & Recovery Insights,” the report highlights trends, opportunities and challenges for IT and business leaders alike. In addition, the company will conduct a live webcast on Jan. 22 detailing the results of the research.

Read More

AlienVault USM selected to extend the security management of the Malta Information Technology...
Unique intelligence on latest mobile threats, including how SS7 network breaches are compromising...
A report from Trustwave reveals many businesses still struggle with information security...
A10 joins forces with leaders RSA, Arista, FireEye, FlowTraq, IBM Security, Ping Identity, Pulse...
Network operators get simplified access to real-time KPIs, proactive alerts, and historical traffic...
IT departments must free themselves from the pressures of tactical necessities before they can be...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more