Computer Disposals Ltd

No doubt most will be focused intensely on their production environment but it's essential not to forget that the GDPR..

Titania Paws Studio 3.2.2

Very keenly priced, it's capable of auditing all Windows, macOS and Linux systems, and offers an impressive range of highly..

Titania Nipper Studio 2.5

Configurations, access rules and security policies need to be audited regularly to identify weaknesses; however, many organisations don't have the..

Malwarebytes Endpoint Protection

Traditional signature-based scanners aren't enough, as cyberattacks are rapidly evolving to circumvent them, so businesses must adopt a more..

Red Sift OnDMARC

The DMARC (Domain-based Message Authentication, Reporting and Conformance) protocol is now an essential defence mechanism against domain name spoofing..

Acunetix 11

Their very survival may depend on it when the EU GDPR (General Data Protection Regulations) come into force in..

CYjAX Intelligence Platform

In many cases, threat updates and signatures provided by security partners aren't enough and now require a blended approach.

..

Ixia ThreatARMOR

Malware, ransomware, botnets, zero-day attacks - they're all on the up, and overworked support staff trying to cope with..

Varonis DatAdvantage

There many more benefits, as it can also help them realise the business value of their data and become..

SecurEnvoy SecurAccess 8

As a long-term player in this market, SecurEnvoy has pioneered tokenless 2FA authentication, as its SecurAccess solution uses personal..

Lepide Auditor Suite 15.2

There are plenty of solutions to choose from, but Lepide's Auditor Suite stands out, as it combines a superb..

Thycotic Secret Server

They are the top of the list for compliance and security audits, so businesses must control access to these critical..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and all..

Embrace a digital future!

Offering invaluable security insight for both IT managers and security specialists, Cyber Security Europe features seminars and solutions on..

Integral Memory Crypto SSD

Even the MoD had to own up recently to having a laptop containing confidential employee and banking information stolen..

macmon NAC

NAC from German company macmon neatly avoids these pitfalls, as its minimal system requirements and agentless architecture means it..

Titania TEC

We've always been impressed with Titania's Nipper Studio and PAWS Studio products, and TEC now brings them both under..

25

Targeting the vulnerable

People think cybersecurity is the risk that comes from someone stealing something that we hold: money, information, even our identity...

Everyone is at risk

Cybercrime targeted at small businesses is increasing at an alarming rate and it's a problem that's not about to go..

Protecting data to protect patients

Healthcare providers, support services and technology manufacturers have emerged as a favoured target of cyber criminals. Beyond the headlines of..

A taste of things to come

Last year saw wave after wave of tech news hitting the headlines. Whether it was documenting a huge technological advancement,..

Mission? Detection!

According to the NTT Security 2017 Risk Value report, 57% of organisations believe they will definitely suffer an information security..

GDPR: The Silver Lining

The majority of conversations surrounding the imminent arrival of GDPR - General Data Protection Regulation - strike a tone..

Life on the cutting edge

Over the next five years, the top three technologies that are set to move from the fringes to the..

Q&A

What challenges do IT professionals face when managing retired assets?
Today's IT professional is tasked with multiple and, sometimes, competing..

The fraud bonanza

The annual cost of fraud in the UK could be as high as £193bn a year, far higher than..

It's showtime!

Infosecurity Europe, from 7-9 June 2016 at Olympia London, is the region's number one information security event, featuring Europe's..

Gateway to safety

The potential benefits offered by the switch to cloud-based applications and services are undoubtedly compelling for many organisations. However,..

Race against time

Under the current EU privacy laws, controllers are the addressee of the security requirements and any enforcement takes place..

Tipping the balance!

In 2015, the world's mobile worker population will reach 1.3 billion, representing 37.2% of the global workforce, an increase..

25

Pressure mounts on ISPS

DDoS attacks are a greater security threat to businesses in 2017 than ever before and Internet service providers (ISPs)..

Businesses begin to fight back

That's the finding of Hiscox's latest Cyber Readiness Report, compiled from a survey of more than 3,000 executives, departmental heads,..

Barometer's highs and lows

The barometer has been directly compared to Altodigital’s security barometer from 2013 to discover how much UK businesses have developed,..

Online extortion hits new heights

Cyber threats reached an all-time high, with ransomware and business email compromise (BEC) scams gaining increased popularity among cybercriminals looking..

New postgraduate I.T. degrees

With billions of pounds being lost to the economy through cybercrime, Arden University has been working with industry specialists..

Centre of excellence for Dublin

The centre will be committed to conducting research into the latest cyberattacks and trends, while developing tools for the..

Hacked off by the hackers

The Centrify study, which surveyed 2,400 people in the US, UK and Germany, also found that consumers..

More attacks unleashed

"While attack sizes are decreasing, we continue to see an uptick in the number of attacks as..

81

It's war - and it's now

Government and corporate cyber resources are under attack around the globe. It is a grim picture to acknowledge, but it..

Real solutions, not band-aids!

The need to ensure security compliance in an increasingly agile world where BYOD is becoming the new mobility norm, with..

It's time to be very ready!

When Cisco launched its first Privacy Maturity Benchmark Study in February this year, it found that 74% of privacy-immature organisations..

Hacking on the cheap

A Daily Mail investigation into the strength of various technologically-driven alternatives to the basic password has revealed the ease with..

AI versus a human hacker

"Please type the words you see in the image." Familiar? Yes, at some point we have all completed a 'captcha'..

Everyone is at risk

Cybercrime targeted at small businesses is increasing at an alarming rate and it's a problem that's not about to go..

The Vital Link

Predictive analytics is an emerging discipline that will become, according to Jeff Costlow, director of security, ExtraHop, a vital practice..

Titania Nipper Studio 2.5

Configurations, access rules and security policies need to be audited regularly to identify weaknesses; however, many organisations don't have the..

Deadly game of Hide 'n' Seek

A new bot, dubbed HNS, has been intercepted by Bitdefender's IoT honeypot system, following a credentials dictionary attack on the..

Driving into the unknown

Connected cars are a reality; most modern vehicles on the road nowadays have some form of connectivity to the open..

An urgent call to arms

Whatever we may have thought of the many breaches, hacks and ransomware attacks that hit the headlines in 2017, do..

A taste of things to come

Last year saw wave after wave of tech news hitting the headlines. Whether it was documenting a huge technological advancement,..

Armed to fight back

By providing permanent Cyber Range capabilities for its customers in Europe, the Middle East and Africa, the Americas and the..

Taking the fight to the enemy

Everyone will be waiting for 25 May
Ferbrache: "This is the day that the General Data Protection Regulation (GDPR) comes into..

Titania Paws Studio 3.2.2

Very keenly priced, it's capable of auditing all Windows, macOS and Linux systems, and offers an impressive range of highly..

Protecting data to protect patients

Healthcare providers, support services and technology manufacturers have emerged as a favoured target of cyber criminals. Beyond the headlines of..

The dark destroyers

More than a million leaked and hacked credentials from the UK's top law firms have been tracked down to the..

Time to face up

The choice between Protection + Prevention versus Detection + Response is an illusion - that is the contention of David..

Risk and reward in the big city

Of course, everything on the Disneyland ride Utopia, from its stoplight-less streets and smooth traffic control, was pre-programmed. It was..

Targeting the vulnerable

People think cybersecurity is the risk that comes from someone stealing something that we hold: money, information, even our identity...

The under-the-radar menace

A hacker often needs only one piece of information to expose a company to a data breach. While large-scale breaches..

Tomorrow's Security Today!

The theme of this year's Infosecurity Europe is 'Building Tomorrow's Security Today', reflecting the need for the information security industry..

Computer Disposals Ltd

No doubt most will be focused intensely on their production environment but it's essential not to forget that the GDPR..

The case for investing in people

The shortage in skilled security staff has been growing year-on-year to today where over half of surveyed professionals in a..

A Hefty Data Centre Security Challenge

VIRTUS leads the industry with award winning innovation in hyper efficient, ultra-high density and highly interconnected facilities.

With extensive expansion plans..

47

A Hefty Data Centre Security Challenge

VIRTUS leads the industry with award winning innovation in hyper efficient, ultra-high density and highly interconnected facilities.

With extensive expansion plans..

The under-the-radar menace

A hacker often needs only one piece of information to expose a company to a data breach. While large-scale breaches..

Computer Disposals Ltd

No doubt most will be focused intensely on their production environment but it's essential not to forget that the GDPR..

Tomorrow's Security Today!

The theme of this year's Infosecurity Europe is 'Building Tomorrow's Security Today', reflecting the need for the information security industry..

Targeting the vulnerable

People think cybersecurity is the risk that comes from someone stealing something that we hold: money, information, even our identity...

Time to face up

The choice between Protection + Prevention versus Detection + Response is an illusion - that is the contention of David..

The case for investing in people

The shortage in skilled security staff has been growing year-on-year to today where over half of surveyed professionals in a..

AI versus a human hacker

"Please type the words you see in the image." Familiar? Yes, at some point we have all completed a 'captcha'..

Deadly game of Hide 'n' Seek

A new bot, dubbed HNS, has been intercepted by Bitdefender's IoT honeypot system, following a credentials dictionary attack on the..

Driving into the unknown

Connected cars are a reality; most modern vehicles on the road nowadays have some form of connectivity to the open..

The dark destroyers

More than a million leaked and hacked credentials from the UK's top law firms have been tracked down to the..

It's time to be very ready!

When Cisco launched its first Privacy Maturity Benchmark Study in February this year, it found that 74% of privacy-immature organisations..

Everyone is at risk

Cybercrime targeted at small businesses is increasing at an alarming rate and it's a problem that's not about to go..

Protecting data to protect patients

Healthcare providers, support services and technology manufacturers have emerged as a favoured target of cyber criminals. Beyond the headlines of..

An urgent call to arms

Whatever we may have thought of the many breaches, hacks and ransomware attacks that hit the headlines in 2017, do..

A taste of things to come

Last year saw wave after wave of tech news hitting the headlines. Whether it was documenting a huge technological advancement,..

Risk and reward in the big city

Of course, everything on the Disneyland ride Utopia, from its stoplight-less streets and smooth traffic control, was pre-programmed. It was..

Titania Paws Studio 3.2.2

Very keenly priced, it's capable of auditing all Windows, macOS and Linux systems, and offers an impressive range of highly..

It's war - and it's now

Government and corporate cyber resources are under attack around the globe. It is a grim picture to acknowledge, but it..

Hacking on the cheap

A Daily Mail investigation into the strength of various technologically-driven alternatives to the basic password has revealed the ease with..

Taking the fight to the enemy

Everyone will be waiting for 25 May
Ferbrache: "This is the day that the General Data Protection Regulation (GDPR) comes into..

Real solutions, not band-aids!

The need to ensure security compliance in an increasingly agile world where BYOD is becoming the new mobility norm, with..

Armed to fight back

By providing permanent Cyber Range capabilities for its customers in Europe, the Middle East and Africa, the Americas and the..

The Vital Link

Predictive analytics is an emerging discipline that will become, according to Jeff Costlow, director of security, ExtraHop, a vital practice..

Titania Nipper Studio 2.5

Configurations, access rules and security policies need to be audited regularly to identify weaknesses; however, many organisations don't have the..

47