Acunetix 11

Their very survival may depend on it when the EU GDPR (General Data Protection Regulations) come into force in..

CYjAX Intelligence Platform

In many cases, threat updates and signatures provided by security partners aren't enough and now require a blended approach.

..

CYjAX Intelligence Platform

In many cases, threat updates and signatures provided by security partners aren't enough and now require a blended approach.

..

Ixia ThreatARMOR

Malware, ransomware, botnets, zero-day attacks - they're all on the up, and overworked support staff trying to cope with..

Varonis DatAdvantage

There many more benefits, as it can also help them realise the business value of their data and become..

SecurEnvoy SecurAccess 8

As a long-term player in this market, SecurEnvoy has pioneered tokenless 2FA authentication, as its SecurAccess solution uses personal..

Lepide Auditor Suite 15.2

There are plenty of solutions to choose from, but Lepide's Auditor Suite stands out, as it combines a superb..

Thycotic Secret Server

They are the top of the list for compliance and security audits, so businesses must control access to these critical..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and all..

Embrace a digital future!

Offering invaluable security insight for both IT managers and security specialists, Cyber Security Europe features seminars and solutions on..

Integral Memory Crypto SSD

Even the MoD had to own up recently to having a laptop containing confidential employee and banking information stolen..

macmon NAC

NAC from German company macmon neatly avoids these pitfalls, as its minimal system requirements and agentless architecture means it..

Titania TEC

We've always been impressed with Titania's Nipper Studio and PAWS Studio products, and TEC now brings them both under..

Libra ESVA 3.5 Review

All the main virtualisation platforms are supported, as ESVA is available for VMware, Hyper-V, plus Citrix XenServer,..

Gemalto SafeNet ProtectV 2.0

SafeNet ProtectV by Gemalto is an elegant solution to these issues, as it applies complete end-to-end encryption to..

24

Q&A

What challenges do IT professionals face when managing retired assets?
Today's IT professional is tasked with multiple and, sometimes, competing..

The fraud bonanza

The annual cost of fraud in the UK could be as high as £193bn a year, far higher than..

It's showtime!

Infosecurity Europe, from 7-9 June 2016 at Olympia London, is the region's number one information security event, featuring Europe's..

Gateway to safety

The potential benefits offered by the switch to cloud-based applications and services are undoubtedly compelling for many organisations. However,..

Race against time

Under the current EU privacy laws, controllers are the addressee of the security requirements and any enforcement takes place..

Tipping the balance!

In 2015, the world's mobile worker population will reach 1.3 billion, representing 37.2% of the global workforce, an increase..

Top 3 data security threats

Sometimes we feel like we keep repeating ourselves and then we realise that's our job as vendors: to speak..

So far, so good...

Mobile ransomware, targeted job fraud and Trojans lurking behind shocking videos are all expected to make their appearance on..

Technologies to keep you safe

Organisations are dedicating increasing resources to security and risk. Nevertheless, attacks are increasing in frequency and sophistication. Advanced targeted attacks..

Taking the next step up

While the ITAD [IT Asset Disposal] industry has traditionally focused on asset disposal, we see incredible value in thinking about..

Anti-Virus, the Cloudmark way

As a computer security researcher for Cloudmark, I regularly have to investigate files that may contain malware. My first step..

Beyond Antivirus

Antivirus has been a central component of network and endpoint security for many years, and it's a central part of..

Becoming an APT Spycatcher

Cybercrime has more in common with the golden era of spying and Philby, Burgess and Maclean - infiltrate, stay hidden..

20

Pressure mounts on ISPS

DDoS attacks are a greater security threat to businesses in 2017 than ever before and Internet service providers (ISPs)..

Businesses begin to fight back

That's the finding of Hiscox's latest Cyber Readiness Report, compiled from a survey of more than 3,000 executives, departmental heads,..

Barometer's highs and lows

The barometer has been directly compared to Altodigital’s security barometer from 2013 to discover how much UK businesses have developed,..

Online extortion hits new heights

Cyber threats reached an all-time high, with ransomware and business email compromise (BEC) scams gaining increased popularity among cybercriminals looking..

New postgraduate I.T. degrees

With billions of pounds being lost to the economy through cybercrime, Arden University has been working with industry specialists..

Centre of excellence for Dublin

The centre will be committed to conducting research into the latest cyberattacks and trends, while developing tools for the..

Hacked off by the hackers

The Centrify study, which surveyed 2,400 people in the US, UK and Germany, also found that consumers..

More attacks unleashed

"While attack sizes are decreasing, we continue to see an uptick in the number of attacks as..

107

Malware malevolence

Signature and behavioural-based anti-malware are widely regarded as no match for next-generation adversaries who utilise mutating hashes, sophisticated obfuscation mechanisms,..

IoT - the good and the bad

Intelligent Internet-powered integration is catapulting entire sectors of the economy into a new digitally enhanced era populated with innovations like..

The finger of blame

It's generally acknowledged, with real passion and sincerity, that employees are a company's greatest asset. Indeed, without the know-how, dedication..

Acunetix 11

Their very survival may depend on it when the EU GDPR (General Data Protection Regulations) come into force in..

When will we ever learn?

Many would have been forgiven if they reacted to the massive breach at Yahoo last year as beyond comprehension. After..

Centre of attention

With increased pressure to rapidly innovate and align security initiatives with business goals, security operations centres (SOCs) provide the..

Manning The Perimeter Walls

As the industry grew smarter and more focused on the nature of threats it faced, next-generation firewalls (NGFW) emerged,..

Scammers get scammed!

Would-be cyber scammers made a megabyte blunder when they cold-called Matt Horan of C3IA Solutions - because he is one..

Nowhere to hide

Email is built into almost everything - from phones and tables to traditional computers to gaming devices, to your..

Beware the double-edged sword

How do you stay one step ahead of the attackers, when it comes to employing the latest encryption technology? What..

After the flood

A new report, 'On the Radar', from leading research company Ovum shines a light on the extent of the mobile..

Breaches surge

Cyber security incidents have spread way beyond headline-grabbing events, such as the TalkTalk hack or the Russian election-related hacks in..

Ransomware top of threat list

WatchGuard's new global channel partner survey on cyber security reveals that 83% of resellers believe that ransomware will be..

Simple twist of fate

All-out attacks on organisations have been getting worse, with no business, small, medium or vast, escaping the attention of those..

Threat detection - and response

A cloud-based service has been launched to give small and midsize businesses, distributed enterprises and managed security service providers (MSSPs)..

Time to think twice!

While ensuring that systems and applications are fully updated to protect a business against malware is essential, more can..

Pressure mounts on ISPS

DDoS attacks are a greater security threat to businesses in 2017 than ever before and Internet service providers (ISPs)..

CYjAX Intelligence Platform

In many cases, threat updates and signatures provided by security partners aren't enough and now require a blended approach.

..

Online extortion hits new heights

Cyber threats reached an all-time high, with ransomware and business email compromise (BEC) scams gaining increased popularity among cybercriminals looking..

The clock is ticking…

Any business that stores data on EU citizens will become subject to the new European General Data Protection Regulations (GDPR),..

Businesses begin to fight back

That's the finding of Hiscox's latest Cyber Readiness Report, compiled from a survey of more than 3,000 executives, departmental heads,..

Barometer's highs and lows

The barometer has been directly compared to Altodigital’s security barometer from 2013 to discover how much UK businesses have developed,..

Mighty Battle of Wits

On 14 February, the much vaunted National Cyber Security Centre (NCSC) was officially opened by Her Majesty The Queen -..

CYjAX Intelligence Platform

In many cases, threat updates and signatures provided by security partners aren't enough and now require a blended approach.

..

Centre of excellence for Dublin

The centre will be committed to conducting research into the latest cyberattacks and trends, while developing tools for the..

New postgraduate I.T. degrees

With billions of pounds being lost to the economy through cybercrime, Arden University has been working with industry specialists..

Soldier's fighting quest

Nyame Ayeh Assuon, known as Sony, a Lance Corporal in the Royal Corps of Signals, is trying to raise £35,000..

Mass data breaches eliminated

Q. Computing Security: We've heard a great deal about your Olfactex solution. How exactly does it work?
Joseph Yannaccone: Olfactex..

It's show time once again!

The theme of this year's Infosecurity Europe is ‘Cybersecurity at the Speed of Business’. Against a backdrop of global..

Many happy returns!

With commerciality, brand reputation and data security at the forefront of everyone's minds, it's easy for sustainable solutions to slip..

No soft touch

It is undeniable that modern society is very dependent on software. Governments and employers rely on databases that keep sensitive..

54

Acunetix 11

Their very survival may depend on it when the EU GDPR (General Data Protection Regulations) come into force in..

Pressure mounts on ISPS

DDoS attacks are a greater security threat to businesses in 2017 than ever before and Internet service providers (ISPs)..

Nowhere to hide

Email is built into almost everything - from phones and tables to traditional computers to gaming devices, to your..

Beware the double-edged sword

How do you stay one step ahead of the attackers, when it comes to employing the latest encryption technology? What..

It's show time once again!

The theme of this year's Infosecurity Europe is ‘Cybersecurity at the Speed of Business’. Against a backdrop of global..

The clock is ticking…

Any business that stores data on EU citizens will become subject to the new European General Data Protection Regulations (GDPR),..

After the flood

A new report, 'On the Radar', from leading research company Ovum shines a light on the extent of the mobile..

Mass data breaches eliminated

Q. Computing Security: We've heard a great deal about your Olfactex solution. How exactly does it work?
Joseph Yannaccone: Olfactex..

Many happy returns!

With commerciality, brand reputation and data security at the forefront of everyone's minds, it's easy for sustainable solutions to slip..

No soft touch

It is undeniable that modern society is very dependent on software. Governments and employers rely on databases that keep sensitive..

Malware malevolence

Signature and behavioural-based anti-malware are widely regarded as no match for next-generation adversaries who utilise mutating hashes, sophisticated obfuscation mechanisms,..

Scammers get scammed!

Would-be cyber scammers made a megabyte blunder when they cold-called Matt Horan of C3IA Solutions - because he is one..

CYjAX Intelligence Platform

In many cases, threat updates and signatures provided by security partners aren't enough and now require a blended approach.

..

Breaches surge

Cyber security incidents have spread way beyond headline-grabbing events, such as the TalkTalk hack or the Russian election-related hacks in..

The finger of blame

It's generally acknowledged, with real passion and sincerity, that employees are a company's greatest asset. Indeed, without the know-how, dedication..

IoT - the good and the bad

Intelligent Internet-powered integration is catapulting entire sectors of the economy into a new digitally enhanced era populated with innovations like..

Mighty Battle of Wits

On 14 February, the much vaunted National Cyber Security Centre (NCSC) was officially opened by Her Majesty The Queen -..

Simple twist of fate

All-out attacks on organisations have been getting worse, with no business, small, medium or vast, escaping the attention of those..

Soldier's fighting quest

Nyame Ayeh Assuon, known as Sony, a Lance Corporal in the Royal Corps of Signals, is trying to raise £35,000..

Threat detection - and response

A cloud-based service has been launched to give small and midsize businesses, distributed enterprises and managed security service providers (MSSPs)..

Businesses begin to fight back

That's the finding of Hiscox's latest Cyber Readiness Report, compiled from a survey of more than 3,000 executives, departmental heads,..

Barometer's highs and lows

The barometer has been directly compared to Altodigital’s security barometer from 2013 to discover how much UK businesses have developed,..

Online extortion hits new heights

Cyber threats reached an all-time high, with ransomware and business email compromise (BEC) scams gaining increased popularity among cybercriminals looking..

Time to think twice!

While ensuring that systems and applications are fully updated to protect a business against malware is essential, more can..

CYjAX Intelligence Platform

In many cases, threat updates and signatures provided by security partners aren't enough and now require a blended approach.

..

Manning The Perimeter Walls

As the industry grew smarter and more focused on the nature of threats it faced, next-generation firewalls (NGFW) emerged,..

Ransomware top of threat list

WatchGuard's new global channel partner survey on cyber security reveals that 83% of resellers believe that ransomware will be..

Centre of attention

With increased pressure to rapidly innovate and align security initiatives with business goals, security operations centres (SOCs) provide the..

When will we ever learn?

Many would have been forgiven if they reacted to the massive breach at Yahoo last year as beyond comprehension. After..

New postgraduate I.T. degrees

With billions of pounds being lost to the economy through cybercrime, Arden University has been working with industry specialists..

Centre of excellence for Dublin

The centre will be committed to conducting research into the latest cyberattacks and trends, while developing tools for the..

54