Companies need to stop divorcing themselves from cyber security

The 2015 Data Protection Best Practices and Risk Assessment Guides has revealed that in January to June last year over 30 per cent of data breaches involving the loss of personally identifiable information (PII) were caused by internal intrusions -- while a further 29 per cent were caused either accidentally or maliciously by employees. Richard Pharro, CEO of APM Group, gives his opinions on the issue.

Read More



New report helps Victims Service Alliance organisations meet data protection challenge

The Information Commissioner’s Office (ICO) has published a report highlighting how organisations attached to the Victims Services Alliance (VSA) are looking after people’s information in compliance with the Data Protection Act (DPA). 

Read More


IT resilience more important than ever as the demand for data expands across all platforms

Vision Solutions Inc. has announced its Seventh Annual State of Resilience Report. Entitled “The Future of IT: Migrations, Protection & Recovery Insights,” the report highlights trends, opportunities and challenges for IT and business leaders alike. In addition, the company will conduct a live webcast on Jan. 22 detailing the results of the research.

Read More

Findings show that security concerns are a major concern for the majority of businesses considering...
Twenty-seven percent of IT professionals ‘not confident’ in the secure configuration of...
HP Wolf Security threat research team sees cybercriminals using legitimate cloud providers to host...
Manx Telecom deploys Radware’s DefensePro to help protect its networks on the Isle of Man.
Becrypt mShare addresses the growing demands and conflicts that data leakage prevention is placing...
After more than 100 percent year-over-year growth, endpoint data security leader taps former Eloqua...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more