Malwarebytes Endpoint Protection

Traditional signature-based scanners aren't enough, as cyberattacks are rapidly evolving to circumvent them, so businesses must adopt a more..

Red Sift OnDMARC

The DMARC (Domain-based Message Authentication, Reporting and Conformance) protocol is now an essential defence mechanism against domain name spoofing..

Acunetix 11

Their very survival may depend on it when the EU GDPR (General Data Protection Regulations) come into force in..

CYjAX Intelligence Platform

In many cases, threat updates and signatures provided by security partners aren't enough and now require a blended approach.

..

Ixia ThreatARMOR

Malware, ransomware, botnets, zero-day attacks - they're all on the up, and overworked support staff trying to cope with..

Varonis DatAdvantage

There many more benefits, as it can also help them realise the business value of their data and become..

SecurEnvoy SecurAccess 8

As a long-term player in this market, SecurEnvoy has pioneered tokenless 2FA authentication, as its SecurAccess solution uses personal..

Lepide Auditor Suite 15.2

There are plenty of solutions to choose from, but Lepide's Auditor Suite stands out, as it combines a superb..

Thycotic Secret Server

They are the top of the list for compliance and security audits, so businesses must control access to these critical..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and all..

Embrace a digital future!

Offering invaluable security insight for both IT managers and security specialists, Cyber Security Europe features seminars and solutions on..

Integral Memory Crypto SSD

Even the MoD had to own up recently to having a laptop containing confidential employee and banking information stolen..

macmon NAC

NAC from German company macmon neatly avoids these pitfalls, as its minimal system requirements and agentless architecture means it..

Titania TEC

We've always been impressed with Titania's Nipper Studio and PAWS Studio products, and TEC now brings them both under..

Libra ESVA 3.5 Review

All the main virtualisation platforms are supported, as ESVA is available for VMware, Hyper-V, plus Citrix XenServer,..

Gemalto SafeNet ProtectV 2.0

SafeNet ProtectV by Gemalto is an elegant solution to these issues, as it applies complete end-to-end encryption to..

24

Q&A

What challenges do IT professionals face when managing retired assets?
Today's IT professional is tasked with multiple and, sometimes, competing..

The fraud bonanza

The annual cost of fraud in the UK could be as high as £193bn a year, far higher than..

It's showtime!

Infosecurity Europe, from 7-9 June 2016 at Olympia London, is the region's number one information security event, featuring Europe's..

Gateway to safety

The potential benefits offered by the switch to cloud-based applications and services are undoubtedly compelling for many organisations. However,..

Race against time

Under the current EU privacy laws, controllers are the addressee of the security requirements and any enforcement takes place..

Tipping the balance!

In 2015, the world's mobile worker population will reach 1.3 billion, representing 37.2% of the global workforce, an increase..

Top 3 data security threats

Sometimes we feel like we keep repeating ourselves and then we realise that's our job as vendors: to speak..

So far, so good...

Mobile ransomware, targeted job fraud and Trojans lurking behind shocking videos are all expected to make their appearance on..

Technologies to keep you safe

Organisations are dedicating increasing resources to security and risk. Nevertheless, attacks are increasing in frequency and sophistication. Advanced targeted attacks..

17

Pressure mounts on ISPS

DDoS attacks are a greater security threat to businesses in 2017 than ever before and Internet service providers (ISPs)..

Businesses begin to fight back

That's the finding of Hiscox's latest Cyber Readiness Report, compiled from a survey of more than 3,000 executives, departmental heads,..

Barometer's highs and lows

The barometer has been directly compared to Altodigital’s security barometer from 2013 to discover how much UK businesses have developed,..

Online extortion hits new heights

Cyber threats reached an all-time high, with ransomware and business email compromise (BEC) scams gaining increased popularity among cybercriminals looking..

New postgraduate I.T. degrees

With billions of pounds being lost to the economy through cybercrime, Arden University has been working with industry specialists..

Centre of excellence for Dublin

The centre will be committed to conducting research into the latest cyberattacks and trends, while developing tools for the..

Hacked off by the hackers

The Centrify study, which surveyed 2,400 people in the US, UK and Germany, also found that consumers..

More attacks unleashed

"While attack sizes are decreasing, we continue to see an uptick in the number of attacks as..

95

Aftershock of a data breach

There is a strong correlation between the security of a business and the valuation of that company. In the..

Acunetix 11

Their very survival may depend on it when the EU GDPR (General Data Protection Regulations) come into force in..

Nowhere to hide

Email is built into almost everything - from phones and tables to traditional computers to gaming devices, to your..

After the flood

A new report, 'On the Radar', from leading research company Ovum shines a light on the extent of the mobile..

Beware the double-edged sword

How do you stay one step ahead of the attackers, when it comes to employing the latest encryption technology? What..

The clock is ticking…

Any business that stores data on EU citizens will become subject to the new European General Data Protection Regulations (GDPR),..

Pressure mounts on ISPS

DDoS attacks are a greater security threat to businesses in 2017 than ever before and Internet service providers (ISPs)..

Unclouded thinking

It's a given that a well-established cloud computing vendor will ensure they have the latest sophisticated security systems in place..

Outside in

Many organisations turn to managed security services (MSS) providers to deliver the expertise, knowledge and infrastructure they need to secure..

Built-in protection

Whether designing a new security architecture or addressing the requirements of compliance standards, such as PCI-DSS, GDPR, and HIPAA,..

Mass data breaches eliminated

Q. Computing Security: We've heard a great deal about your Olfactex solution. How exactly does it work?
Joseph Yannaccone: Olfactex..

Magnetic influence

Artificial Intelligence (AI) covers a broad range of technologies, such as artificial neural networks (ANN), machine learning and expert..

It's show time once again!

The theme of this year's Infosecurity Europe is ‘Cybersecurity at the Speed of Business’. Against a backdrop of global..

Harsh winds of change ahead

The new Data Protection Bill, which plans to overhaul the UK's data protection regulations, has been welcomed by many..

Many happy returns!

With commerciality, brand reputation and data security at the forefront of everyone's minds, it's easy for sustainable solutions to slip..

No soft touch

It is undeniable that modern society is very dependent on software. Governments and employers rely on databases that keep sensitive..

You don't have to be a victim

A targeted attack seeks to breach the security measures of a specific individual or organisation. Usually the initial attack,..

Bolstering Your Own Defences

Bring your own device (BYOD) adoption has risen greatly over the past few years, as companies look to improve..

Torn by tough choices

The proliferation of BYOD makes the identification of a threat injected at the core of the network almost impossible,..

Red Sift OnDMARC

The DMARC (Domain-based Message Authentication, Reporting and Conformance) protocol is now an essential defence mechanism against domain name spoofing..

Malwarebytes Endpoint Protection

Traditional signature-based scanners aren't enough, as cyberattacks are rapidly evolving to circumvent them, so businesses must adopt a more..

In the line of fire

Almost a third (31%) of organisations have been affected by cybercrime in the past 12 months, according to new..

Threats that never die

Kaspersky Lab and Kings College London researchers, while they were looking for a link between a modern threat actor..

Inside The Data Maze

What are the key steps that any business needs to take to counteract the growing risks they are exposed..

Space invaders

Cifas, the UK's leading fraud prevention service, has released new figures showing that identity fraud has hit the highest..

'Weaponisation' of everyday devices

The advantages of accessing data from smart devices include condition monitoring, predictive analytics and predictive maintenance, all of which..

Runaway success!

Infosecurity Europe 2017 was launched in style by welcoming Dame Stella Rimington, former director general of MI5, to present..

Securing email is essential

According to the Radicati Group, there are currently more than 3.7 billion people using email on a worldwide basis,..

Time for a unified front

Where once it was the bigger boys who saw themselves as the prime targets for all-out attacks, that threat..

No Soft Touch

It is undeniable that modern society is very dependent on software. Governments and employers rely on databases that keep..

Mighty storm unleashed

Check Point researchers have discovered a new botnet, dubbed 'IoTroop', evolving and recruiting IoT devices at a far greater..

Back to Basics

If we look back over the high-profile cybercrimes of the past few years, there is a clear trend, suggests..

GDPR: The Silver Lining

The majority of conversations surrounding the imminent arrival of GDPR - General Data Protection Regulation - strike a tone..

Life on the cutting edge

Over the next five years, the top three technologies that are set to move from the fringes to the..

Mission? Detection!

According to the NTT Security 2017 Risk Value report, 57% of organisations believe they will definitely suffer an information..

Checkmate

Application development has surged forward by leaps and bounds since the punch card era of the 1970s. Yet those..

China Crackdown

China has become a great enticement for UK organisations, including the security industry, with lucrative business contracts to be..

Computing Security Awards 2017

The 2017 Computing Security Awards took place during a gala night at the Radisson Blu in central London, celebrating..

96

Mission? Detection!

According to the NTT Security 2017 Risk Value report, 57% of organisations believe they will definitely suffer an information..

Checkmate

Application development has surged forward by leaps and bounds since the punch card era of the 1970s. Yet those..

Mighty storm unleashed

Check Point researchers have discovered a new botnet, dubbed 'IoTroop', evolving and recruiting IoT devices at a far greater..

China Crackdown

China has become a great enticement for UK organisations, including the security industry, with lucrative business contracts to be..

Back to Basics

If we look back over the high-profile cybercrimes of the past few years, there is a clear trend, suggests..

GDPR: The Silver Lining

The majority of conversations surrounding the imminent arrival of GDPR - General Data Protection Regulation - strike a tone..

Life on the cutting edge

Over the next five years, the top three technologies that are set to move from the fringes to the..

Computing Security Awards 2017

The 2017 Computing Security Awards took place during a gala night at the Radisson Blu in central London, celebrating..

Bolstering Your Own Defences

Bring your own device (BYOD) adoption has risen greatly over the past few years, as companies look to improve..

Securing email is essential

According to the Radicati Group, there are currently more than 3.7 billion people using email on a worldwide basis,..

Harsh winds of change ahead

The new Data Protection Bill, which plans to overhaul the UK's data protection regulations, has been welcomed by many..

In the line of fire

Almost a third (31%) of organisations have been affected by cybercrime in the past 12 months, according to new..

Malwarebytes Endpoint Protection

Traditional signature-based scanners aren't enough, as cyberattacks are rapidly evolving to circumvent them, so businesses must adopt a more..

Outside in

Many organisations turn to managed security services (MSS) providers to deliver the expertise, knowledge and infrastructure they need to secure..

Red Sift OnDMARC

The DMARC (Domain-based Message Authentication, Reporting and Conformance) protocol is now an essential defence mechanism against domain name spoofing..

You don't have to be a victim

A targeted attack seeks to breach the security measures of a specific individual or organisation. Usually the initial attack,..

Torn by tough choices

The proliferation of BYOD makes the identification of a threat injected at the core of the network almost impossible,..

Unclouded thinking

It's a given that a well-established cloud computing vendor will ensure they have the latest sophisticated security systems in place..

'Weaponisation' of everyday devices

The advantages of accessing data from smart devices include condition monitoring, predictive analytics and predictive maintenance, all of which..

Aftershock of a data breach

There is a strong correlation between the security of a business and the valuation of that company. In the..

Built-in protection

Whether designing a new security architecture or addressing the requirements of compliance standards, such as PCI-DSS, GDPR, and HIPAA,..

Time for a unified front

Where once it was the bigger boys who saw themselves as the prime targets for all-out attacks, that threat..

Inside The Data Maze

What are the key steps that any business needs to take to counteract the growing risks they are exposed..

Space invaders

Cifas, the UK's leading fraud prevention service, has released new figures showing that identity fraud has hit the highest..

Runaway success!

Infosecurity Europe 2017 was launched in style by welcoming Dame Stella Rimington, former director general of MI5, to present..

Threats that never die

Kaspersky Lab and Kings College London researchers, while they were looking for a link between a modern threat actor..

Magnetic influence

Artificial Intelligence (AI) covers a broad range of technologies, such as artificial neural networks (ANN), machine learning and expert..

No Soft Touch

It is undeniable that modern society is very dependent on software. Governments and employers rely on databases that keep..

Acunetix 11

Their very survival may depend on it when the EU GDPR (General Data Protection Regulations) come into force in..

Pressure mounts on ISPS

DDoS attacks are a greater security threat to businesses in 2017 than ever before and Internet service providers (ISPs)..

Nowhere to hide

Email is built into almost everything - from phones and tables to traditional computers to gaming devices, to your..

Beware the double-edged sword

How do you stay one step ahead of the attackers, when it comes to employing the latest encryption technology? What..

It's show time once again!

The theme of this year's Infosecurity Europe is ‘Cybersecurity at the Speed of Business’. Against a backdrop of global..

The clock is ticking…

Any business that stores data on EU citizens will become subject to the new European General Data Protection Regulations (GDPR),..

After the flood

A new report, 'On the Radar', from leading research company Ovum shines a light on the extent of the mobile..

Mass data breaches eliminated

Q. Computing Security: We've heard a great deal about your Olfactex solution. How exactly does it work?
Joseph Yannaccone: Olfactex..

Many happy returns!

With commerciality, brand reputation and data security at the forefront of everyone's minds, it's easy for sustainable solutions to slip..

No soft touch

It is undeniable that modern society is very dependent on software. Governments and employers rely on databases that keep sensitive..

96