Survey of IT decision makers collectively managing more than 250,000 users finds that as the ‘Dropbox problem’ grows IT is concerned, yet inactive.
Read MoreIan Kilpatrick, chairman Wick Hill Group, specialists in secure IP infrastructure solutions, looks at five key IT security trends and solutions for 2015.
Read MoreDigital Guardian has launched Digital Guardian 7.0, which extends the functionality of the patented Digital Guardian Agent to protect against advanced threats. The extension of Digital Guardian’s data protection capabilities comes with a redesign of the product architecture for ease of...
Read MoreWick Hill has gained the recently launched Government Cyber Essentials certification. The Cyber Essentials Scheme is part of the UK Government’s National Cyber Security Strategy and provides an independent assessment of the essential security controls that organisations need to have in place...
Read MoreAcquisition of stealth-mode start-up enhances threat prevention portfolio to stop attacks before...
Read MoreNew research from the Federation of Small Businesses (FSB) has found that despite three fifths...
Read MoreLos Angeles Dedicated (LAD), a cloud and Infrastructure-as-a-Service provider with a strong focus...
Read MoreTripwire, Inc. has integrated multiple sources of threat intelligence into its Adaptive Threat...
Read MoreFor the organisations that need it most, AirMagnet Enterprise provides nonstop detection, location,...
Read MoreAdapt stands out from the crowd during Cyber Essentials assessment.
Read MoreDell ensures performance of Wi-Fi service in public places such as Wagamama, Pizza Express and...
Read MoreEU Parliament has announced that wants single data protection law in place by end of 2015. This...
Read MoreThe hub will be the first of its kind, enabling companies to quickly scope, define and maintain all...
Read MoreNew Group wide initiative will enable organisations to embrace digital transformation securely.
Read MoreData breaches increased 49 per cent in 2014 to 1 billion data records compromised, with...
Read More