Titania Paws Studio 3.2.2

Very keenly priced, it's capable of auditing all Windows, macOS and Linux systems, and offers an impressive range of highly..

Titania Nipper Studio 2.5

Configurations, access rules and security policies need to be audited regularly to identify weaknesses; however, many organisations don't have the..

Malwarebytes Endpoint Protection

Traditional signature-based scanners aren't enough, as cyberattacks are rapidly evolving to circumvent them, so businesses must adopt a more..

Red Sift OnDMARC

The DMARC (Domain-based Message Authentication, Reporting and Conformance) protocol is now an essential defence mechanism against domain name spoofing..

Acunetix 11

Their very survival may depend on it when the EU GDPR (General Data Protection Regulations) come into force in..

CYjAX Intelligence Platform

In many cases, threat updates and signatures provided by security partners aren't enough and now require a blended approach.

..

Ixia ThreatARMOR

Malware, ransomware, botnets, zero-day attacks - they're all on the up, and overworked support staff trying to cope with..

Varonis DatAdvantage

There many more benefits, as it can also help them realise the business value of their data and become..

SecurEnvoy SecurAccess 8

As a long-term player in this market, SecurEnvoy has pioneered tokenless 2FA authentication, as its SecurAccess solution uses personal..

Lepide Auditor Suite 15.2

There are plenty of solutions to choose from, but Lepide's Auditor Suite stands out, as it combines a superb..

Thycotic Secret Server

They are the top of the list for compliance and security audits, so businesses must control access to these critical..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and all..

Embrace a digital future!

Offering invaluable security insight for both IT managers and security specialists, Cyber Security Europe features seminars and solutions on..

Integral Memory Crypto SSD

Even the MoD had to own up recently to having a laptop containing confidential employee and banking information stolen..

macmon NAC

NAC from German company macmon neatly avoids these pitfalls, as its minimal system requirements and agentless architecture means it..

Titania TEC

We've always been impressed with Titania's Nipper Studio and PAWS Studio products, and TEC now brings them both under..

22

Everyone is at risk

Cybercrime targeted at small businesses is increasing at an alarming rate and it's a problem that's not about to go..

Protecting data to protect patients

Healthcare providers, support services and technology manufacturers have emerged as a favoured target of cyber criminals. Beyond the headlines of..

A taste of things to come

Last year saw wave after wave of tech news hitting the headlines. Whether it was documenting a huge technological advancement,..

Mission? Detection!

According to the NTT Security 2017 Risk Value report, 57% of organisations believe they will definitely suffer an information security..

GDPR: The Silver Lining

The majority of conversations surrounding the imminent arrival of GDPR - General Data Protection Regulation - strike a tone..

Life on the cutting edge

Over the next five years, the top three technologies that are set to move from the fringes to the..

Q&A

What challenges do IT professionals face when managing retired assets?
Today's IT professional is tasked with multiple and, sometimes, competing..

The fraud bonanza

The annual cost of fraud in the UK could be as high as £193bn a year, far higher than..

It's showtime!

Infosecurity Europe, from 7-9 June 2016 at Olympia London, is the region's number one information security event, featuring Europe's..

Gateway to safety

The potential benefits offered by the switch to cloud-based applications and services are undoubtedly compelling for many organisations. However,..

Race against time

Under the current EU privacy laws, controllers are the addressee of the security requirements and any enforcement takes place..

Tipping the balance!

In 2015, the world's mobile worker population will reach 1.3 billion, representing 37.2% of the global workforce, an increase..

20

Pressure mounts on ISPS

DDoS attacks are a greater security threat to businesses in 2017 than ever before and Internet service providers (ISPs)..

Businesses begin to fight back

That's the finding of Hiscox's latest Cyber Readiness Report, compiled from a survey of more than 3,000 executives, departmental heads,..

Barometer's highs and lows

The barometer has been directly compared to Altodigital’s security barometer from 2013 to discover how much UK businesses have developed,..

Online extortion hits new heights

Cyber threats reached an all-time high, with ransomware and business email compromise (BEC) scams gaining increased popularity among cybercriminals looking..

New postgraduate I.T. degrees

With billions of pounds being lost to the economy through cybercrime, Arden University has been working with industry specialists..

Centre of excellence for Dublin

The centre will be committed to conducting research into the latest cyberattacks and trends, while developing tools for the..

Hacked off by the hackers

The Centrify study, which surveyed 2,400 people in the US, UK and Germany, also found that consumers..

More attacks unleashed

"While attack sizes are decreasing, we continue to see an uptick in the number of attacks as..

81

GDPR: The Silver Lining

The majority of conversations surrounding the imminent arrival of GDPR - General Data Protection Regulation - strike a tone..

Checkmate

Application development has surged forward by leaps and bounds since the punch card era of the 1970s. Yet those..

It's war - and it's now

Government and corporate cyber resources are under attack around the globe. It is a grim picture to acknowledge, but it..

Back to Basics

If we look back over the high-profile cybercrimes of the past few years, there is a clear trend, suggests Brian..

Mission? Detection!

According to the NTT Security 2017 Risk Value report, 57% of organisations believe they will definitely suffer an information security..

Real solutions, not band-aids!

The need to ensure security compliance in an increasingly agile world where BYOD is becoming the new mobility norm, with..

Mighty storm unleashed

Check Point researchers have discovered a new botnet, dubbed 'IoTroop', evolving and recruiting IoT devices at a far greater pace..

It's time to be very ready!

When Cisco launched its first Privacy Maturity Benchmark Study in February this year, it found that 74% of privacy-immature organisations..

China Crackdown

China has become a great enticement for UK organisations, including the security industry, with lucrative business contracts to be..

Hacking on the cheap

A Daily Mail investigation into the strength of various technologically-driven alternatives to the basic password has revealed the ease with..

Life on the cutting edge

Over the next five years, the top three technologies that are set to move from the fringes to the..

AI versus a human hacker

"Please type the words you see in the image." Familiar? Yes, at some point we have all completed a 'captcha'..

The Vital Link

Predictive analytics is an emerging discipline that will become, according to Jeff Costlow, director of security, ExtraHop, a vital practice..

Titania Nipper Studio 2.5

Configurations, access rules and security policies need to be audited regularly to identify weaknesses; however, many organisations don't have the..

Everyone is at risk

Cybercrime targeted at small businesses is increasing at an alarming rate and it's a problem that's not about to go..

Deadly game of Hide 'n' Seek

A new bot, dubbed HNS, has been intercepted by Bitdefender's IoT honeypot system, following a credentials dictionary attack on the..

Taking the fight to the enemy

Everyone will be waiting for 25 May
Ferbrache: "This is the day that the General Data Protection Regulation (GDPR) comes into..

Armed to fight back

By providing permanent Cyber Range capabilities for its customers in Europe, the Middle East and Africa, the Americas and the..

A taste of things to come

Last year saw wave after wave of tech news hitting the headlines. Whether it was documenting a huge technological advancement,..

Computing Security Awards 2017

The 2017 Computing Security Awards took place during a gala night at the Radisson Blu in central London, celebrating..

Driving into the unknown

Connected cars are a reality; most modern vehicles on the road nowadays have some form of connectivity to the open..

An urgent call to arms

Whatever we may have thought of the many breaches, hacks and ransomware attacks that hit the headlines in 2017, do..

Titania Paws Studio 3.2.2

Very keenly priced, it's capable of auditing all Windows, macOS and Linux systems, and offers an impressive range of highly..

APCON expands product portfolio

APCON, a leading provider of intelligent network visibility and security solutions, has launched a new series of Copper Bypass..

Protecting data to protect patients

Healthcare providers, support services and technology manufacturers have emerged as a favoured target of cyber criminals. Beyond the headlines of..

The dark destroyers

More than a million leaked and hacked credentials from the UK's top law firms have been tracked down to the..

Risk and reward in the big city

Of course, everything on the Disneyland ride Utopia, from its stoplight-less streets and smooth traffic control, was pre-programmed. It was..

76

AI versus a human hacker

"Please type the words you see in the image." Familiar? Yes, at some point we have all completed a 'captcha'..

Deadly game of Hide 'n' Seek

A new bot, dubbed HNS, has been intercepted by Bitdefender's IoT honeypot system, following a credentials dictionary attack on the..

Driving into the unknown

Connected cars are a reality; most modern vehicles on the road nowadays have some form of connectivity to the open..

The dark destroyers

More than a million leaked and hacked credentials from the UK's top law firms have been tracked down to the..

It's time to be very ready!

When Cisco launched its first Privacy Maturity Benchmark Study in February this year, it found that 74% of privacy-immature organisations..

Everyone is at risk

Cybercrime targeted at small businesses is increasing at an alarming rate and it's a problem that's not about to go..

Protecting data to protect patients

Healthcare providers, support services and technology manufacturers have emerged as a favoured target of cyber criminals. Beyond the headlines of..

An urgent call to arms

Whatever we may have thought of the many breaches, hacks and ransomware attacks that hit the headlines in 2017, do..

A taste of things to come

Last year saw wave after wave of tech news hitting the headlines. Whether it was documenting a huge technological advancement,..

Risk and reward in the big city

Of course, everything on the Disneyland ride Utopia, from its stoplight-less streets and smooth traffic control, was pre-programmed. It was..

Titania Paws Studio 3.2.2

Very keenly priced, it's capable of auditing all Windows, macOS and Linux systems, and offers an impressive range of highly..

It's war - and it's now

Government and corporate cyber resources are under attack around the globe. It is a grim picture to acknowledge, but it..

Hacking on the cheap

A Daily Mail investigation into the strength of various technologically-driven alternatives to the basic password has revealed the ease with..

Taking the fight to the enemy

Everyone will be waiting for 25 May
Ferbrache: "This is the day that the General Data Protection Regulation (GDPR) comes into..

Real solutions, not band-aids!

The need to ensure security compliance in an increasingly agile world where BYOD is becoming the new mobility norm, with..

Armed to fight back

By providing permanent Cyber Range capabilities for its customers in Europe, the Middle East and Africa, the Americas and the..

The Vital Link

Predictive analytics is an emerging discipline that will become, according to Jeff Costlow, director of security, ExtraHop, a vital practice..

Titania Nipper Studio 2.5

Configurations, access rules and security policies need to be audited regularly to identify weaknesses; however, many organisations don't have the..

Mission? Detection!

According to the NTT Security 2017 Risk Value report, 57% of organisations believe they will definitely suffer an information security..

Checkmate

Application development has surged forward by leaps and bounds since the punch card era of the 1970s. Yet those..

Mighty storm unleashed

Check Point researchers have discovered a new botnet, dubbed 'IoTroop', evolving and recruiting IoT devices at a far greater pace..

China Crackdown

China has become a great enticement for UK organisations, including the security industry, with lucrative business contracts to be..

Back to Basics

If we look back over the high-profile cybercrimes of the past few years, there is a clear trend, suggests Brian..

GDPR: The Silver Lining

The majority of conversations surrounding the imminent arrival of GDPR - General Data Protection Regulation - strike a tone..

Life on the cutting edge

Over the next five years, the top three technologies that are set to move from the fringes to the..

Computing Security Awards 2017

The 2017 Computing Security Awards took place during a gala night at the Radisson Blu in central London, celebrating..

APCON expands product portfolio

APCON, a leading provider of intelligent network visibility and security solutions, has launched a new series of Copper Bypass..

76