Titania Nipper Studio 2.5

Configurations, access rules and security policies need to be audited regularly to identify weaknesses; however, many organisations don't have the..

Malwarebytes Endpoint Protection

Traditional signature-based scanners aren't enough, as cyberattacks are rapidly evolving to circumvent them, so businesses must adopt a more..

Red Sift OnDMARC

The DMARC (Domain-based Message Authentication, Reporting and Conformance) protocol is now an essential defence mechanism against domain name spoofing..

Acunetix 11

Their very survival may depend on it when the EU GDPR (General Data Protection Regulations) come into force in..

CYjAX Intelligence Platform

In many cases, threat updates and signatures provided by security partners aren't enough and now require a blended approach.

..

Ixia ThreatARMOR

Malware, ransomware, botnets, zero-day attacks - they're all on the up, and overworked support staff trying to cope with..

Varonis DatAdvantage

There many more benefits, as it can also help them realise the business value of their data and become..

SecurEnvoy SecurAccess 8

As a long-term player in this market, SecurEnvoy has pioneered tokenless 2FA authentication, as its SecurAccess solution uses personal..

Lepide Auditor Suite 15.2

There are plenty of solutions to choose from, but Lepide's Auditor Suite stands out, as it combines a superb..

Thycotic Secret Server

They are the top of the list for compliance and security audits, so businesses must control access to these critical..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and all..

Embrace a digital future!

Offering invaluable security insight for both IT managers and security specialists, Cyber Security Europe features seminars and solutions on..

Integral Memory Crypto SSD

Even the MoD had to own up recently to having a laptop containing confidential employee and banking information stolen..

macmon NAC

NAC from German company macmon neatly avoids these pitfalls, as its minimal system requirements and agentless architecture means it..

Titania TEC

We've always been impressed with Titania's Nipper Studio and PAWS Studio products, and TEC now brings them both under..

Libra ESVA 3.5 Review

All the main virtualisation platforms are supported, as ESVA is available for VMware, Hyper-V, plus Citrix XenServer,..

Gemalto SafeNet ProtectV 2.0

SafeNet ProtectV by Gemalto is an elegant solution to these issues, as it applies complete end-to-end encryption to..

24

Mission? Detection!

According to the NTT Security 2017 Risk Value report, 57% of organisations believe they will definitely suffer an information security..

GDPR: The Silver Lining

The majority of conversations surrounding the imminent arrival of GDPR - General Data Protection Regulation - strike a tone..

Life on the cutting edge

Over the next five years, the top three technologies that are set to move from the fringes to the..

Q&A

What challenges do IT professionals face when managing retired assets?
Today's IT professional is tasked with multiple and, sometimes, competing..

The fraud bonanza

The annual cost of fraud in the UK could be as high as £193bn a year, far higher than..

It's showtime!

Infosecurity Europe, from 7-9 June 2016 at Olympia London, is the region's number one information security event, featuring Europe's..

Gateway to safety

The potential benefits offered by the switch to cloud-based applications and services are undoubtedly compelling for many organisations. However,..

Race against time

Under the current EU privacy laws, controllers are the addressee of the security requirements and any enforcement takes place..

Tipping the balance!

In 2015, the world's mobile worker population will reach 1.3 billion, representing 37.2% of the global workforce, an increase..

Top 3 data security threats

Sometimes we feel like we keep repeating ourselves and then we realise that's our job as vendors: to speak..

So far, so good...

Mobile ransomware, targeted job fraud and Trojans lurking behind shocking videos are all expected to make their appearance on..

19

Pressure mounts on ISPS

DDoS attacks are a greater security threat to businesses in 2017 than ever before and Internet service providers (ISPs)..

Businesses begin to fight back

That's the finding of Hiscox's latest Cyber Readiness Report, compiled from a survey of more than 3,000 executives, departmental heads,..

Barometer's highs and lows

The barometer has been directly compared to Altodigital’s security barometer from 2013 to discover how much UK businesses have developed,..

Online extortion hits new heights

Cyber threats reached an all-time high, with ransomware and business email compromise (BEC) scams gaining increased popularity among cybercriminals looking..

New postgraduate I.T. degrees

With billions of pounds being lost to the economy through cybercrime, Arden University has been working with industry specialists..

Centre of excellence for Dublin

The centre will be committed to conducting research into the latest cyberattacks and trends, while developing tools for the..

Hacked off by the hackers

The Centrify study, which surveyed 2,400 people in the US, UK and Germany, also found that consumers..

More attacks unleashed

"While attack sizes are decreasing, we continue to see an uptick in the number of attacks as..

90

Checkmate

Application development has surged forward by leaps and bounds since the punch card era of the 1970s. Yet those..

Outside in

Many organisations turn to managed security services (MSS) providers to deliver the expertise, knowledge and infrastructure they need to secure..

Back to Basics

If we look back over the high-profile cybercrimes of the past few years, there is a clear trend, suggests Brian..

Securing email is essential

According to the Radicati Group, there are currently more than 3.7 billion people using email on a worldwide basis,..

You don't have to be a victim

A targeted attack seeks to breach the security measures of a specific individual or organisation. Usually the initial attack,..

Mission? Detection!

According to the NTT Security 2017 Risk Value report, 57% of organisations believe they will definitely suffer an information security..

Malwarebytes Endpoint Protection

Traditional signature-based scanners aren't enough, as cyberattacks are rapidly evolving to circumvent them, so businesses must adopt a more..

Mighty storm unleashed

Check Point researchers have discovered a new botnet, dubbed 'IoTroop', evolving and recruiting IoT devices at a far greater pace..

It's war - and it's now

Government and corporate cyber resources are under attack around the globe. It is a grim picture to acknowledge, but it..

Red Sift OnDMARC

The DMARC (Domain-based Message Authentication, Reporting and Conformance) protocol is now an essential defence mechanism against domain name spoofing..

Harsh winds of change ahead

The new Data Protection Bill, which plans to overhaul the UK's data protection regulations, has been welcomed by many..

Real solutions, not band-aids!

The need to ensure security compliance in an increasingly agile world where BYOD is becoming the new mobility norm, with..

Bolstering Your Own Defences

Bring your own device (BYOD) adoption has risen greatly over the past few years, as companies look to improve..

In the line of fire

Almost a third (31%) of organisations have been affected by cybercrime in the past 12 months, according to new..

GDPR: The Silver Lining

The majority of conversations surrounding the imminent arrival of GDPR - General Data Protection Regulation - strike a tone..

China Crackdown

China has become a great enticement for UK organisations, including the security industry, with lucrative business contracts to be..

Life on the cutting edge

Over the next five years, the top three technologies that are set to move from the fringes to the..

Hacking on the cheap

A Daily Mail investigation into the strength of various technologically-driven alternatives to the basic password has revealed the ease with..

The Vital Link

Predictive analytics is an emerging discipline that will become, according to Jeff Costlow, director of security, ExtraHop, a vital practice..

Computing Security Awards 2017

The 2017 Computing Security Awards took place during a gala night at the Radisson Blu in central London, celebrating..

Armed to fight back

By providing permanent Cyber Range capabilities for its customers in Europe, the Middle East and Africa, the Americas and the..

Taking the fight to the enemy

Everyone will be waiting for 25 May
Ferbrache: "This is the day that the General Data Protection Regulation (GDPR) comes into..

APCON expands product portfolio

APCON, a leading provider of intelligent network visibility and security solutions, has launched a new series of Copper Bypass..

Titania Nipper Studio 2.5

Configurations, access rules and security policies need to be audited regularly to identify weaknesses; however, many organisations don't have the..

76

It's war - and it's now

Government and corporate cyber resources are under attack around the globe. It is a grim picture to acknowledge, but it..

Hacking on the cheap

A Daily Mail investigation into the strength of various technologically-driven alternatives to the basic password has revealed the ease with..

Taking the fight to the enemy

Everyone will be waiting for 25 May
Ferbrache: "This is the day that the General Data Protection Regulation (GDPR) comes into..

Real solutions, not band-aids!

The need to ensure security compliance in an increasingly agile world where BYOD is becoming the new mobility norm, with..

Armed to fight back

By providing permanent Cyber Range capabilities for its customers in Europe, the Middle East and Africa, the Americas and the..

The Vital Link

Predictive analytics is an emerging discipline that will become, according to Jeff Costlow, director of security, ExtraHop, a vital practice..

Titania Nipper Studio 2.5

Configurations, access rules and security policies need to be audited regularly to identify weaknesses; however, many organisations don't have the..

Mission? Detection!

According to the NTT Security 2017 Risk Value report, 57% of organisations believe they will definitely suffer an information security..

Checkmate

Application development has surged forward by leaps and bounds since the punch card era of the 1970s. Yet those..

Mighty storm unleashed

Check Point researchers have discovered a new botnet, dubbed 'IoTroop', evolving and recruiting IoT devices at a far greater pace..

China Crackdown

China has become a great enticement for UK organisations, including the security industry, with lucrative business contracts to be..

Back to Basics

If we look back over the high-profile cybercrimes of the past few years, there is a clear trend, suggests Brian..

GDPR: The Silver Lining

The majority of conversations surrounding the imminent arrival of GDPR - General Data Protection Regulation - strike a tone..

Life on the cutting edge

Over the next five years, the top three technologies that are set to move from the fringes to the..

Computing Security Awards 2017

The 2017 Computing Security Awards took place during a gala night at the Radisson Blu in central London, celebrating..

APCON expands product portfolio

APCON, a leading provider of intelligent network visibility and security solutions, has launched a new series of Copper Bypass..

Bolstering Your Own Defences

Bring your own device (BYOD) adoption has risen greatly over the past few years, as companies look to improve..

Securing email is essential

According to the Radicati Group, there are currently more than 3.7 billion people using email on a worldwide basis,..

Harsh winds of change ahead

The new Data Protection Bill, which plans to overhaul the UK's data protection regulations, has been welcomed by many..

In the line of fire

Almost a third (31%) of organisations have been affected by cybercrime in the past 12 months, according to new..

Malwarebytes Endpoint Protection

Traditional signature-based scanners aren't enough, as cyberattacks are rapidly evolving to circumvent them, so businesses must adopt a more..

Outside in

Many organisations turn to managed security services (MSS) providers to deliver the expertise, knowledge and infrastructure they need to secure..

Red Sift OnDMARC

The DMARC (Domain-based Message Authentication, Reporting and Conformance) protocol is now an essential defence mechanism against domain name spoofing..

You don't have to be a victim

A targeted attack seeks to breach the security measures of a specific individual or organisation. Usually the initial attack,..

76