cybersecurity

Image for BAKERHOSTETLER ADDS PRIVACY AND SECURITY COMPLIANCE PRO
Top Stories

BAKERHOSTETLER ADDS PRIVACY AND SECURITY COMPLIANCE PRO

Melinda McLellan joins New York office as Counsel BakerHostetler announced that Melinda McLellan has...

8th November, 2014

Image for FIVE TIPS TO AVOID THE PRODUCTIVITY PARADOX
Technology

FIVE TIPS TO AVOID THE PRODUCTIVITY PARADOX

By Aidan Simister, Director of Sales, Intermedia It’s a typical Monday. I head into the office feeli...

4th November, 2014

Image for FORESCOUT PARTNERS WITH MCAFEE TO DELIVER DYNAMIC ENDPOINT PROTECTION
Top Stories

FORESCOUT PARTNERS WITH MCAFEE TO DELIVER DYNAMIC ENDPOINT PROTECTION

ForeScout Technologies has announced a new partnership with McAfee, part of Intel Security, to provi...

3rd November, 2014

Image for NO BUSINESS IS IMMUNE TO CYBER-ATTACKS – BUT THEY CAN BE EFFECTIVELY MANAGED
Technology

NO BUSINESS IS IMMUNE TO CYBER-ATTACKS – BUT THEY CAN BE EFFECTIVELY MANAGED

By Craig Richardson, CEO of Wynyard Group Craig believes there are two sorts of organisations: those...

3rd November, 2014

Image for FINANCE INDUSTRY MUST ADOPT ZERO TRUST APPROACH TO TACKLE SECURITY CHALLENGE FROM THE INTERNET OF THINGS
Technology

FINANCE INDUSTRY MUST ADOPT ZERO TRUST APPROACH TO TACKLE SECURITY CHALLENGE FROM THE INTERNET OF THINGS

By Wieland Alge, VP & GM of EMEA at Barracuda Networks Despite all the hype around the Internet...

30th October, 2014

Image for FOREGENIX STAYS AT THE FOREFRONT OF P2PE CERTIFYING 88% OF ALL GLOBAL APPLICATIONS
Top Stories

FOREGENIX STAYS AT THE FOREFRONT OF P2PE CERTIFYING 88% OF ALL GLOBAL APPLICATIONS

Foregenix, forerunners in information security, has certified 88% of the world’s Point-to-Point-Encr...

29th October, 2014

Image for TOP TIPS FOR AVOIDING THE DREADED DATA FINE
Technology

TOP TIPS FOR AVOIDING THE DREADED DATA FINE

Jonathan Armstrong, data regulation advisor for Absolute Software and technology lawyer at Cordery T...

29th October, 2014

Image for MEETING THE CHALLENGE OF PROVIDING SECURE CONTENT ACCESS, SYNC AND SHARE
Business

MEETING THE CHALLENGE OF PROVIDING SECURE CONTENT ACCESS, SYNC AND SHARE

By Anders Lofgren, VP of Product Management, Acronis Access The advent of mobility is radically affe...

29th October, 2014

Image for COMBATTING ONLINE FRAUD – CONSUMERS AND BANKS NEED TO WORK TOGETHER
Banking

COMBATTING ONLINE FRAUD – CONSUMERS AND BANKS NEED TO WORK TOGETHER

Gary Newe, technical director, F5 Networks Last month, industry watchdog, Financial Fraud Action UK...

28th October, 2014

Image for NEXT-GENERATION FIREWALLS MUST EVOLVE TO REMAIN RELEVANT
Technology

NEXT-GENERATION FIREWALLS MUST EVOLVE TO REMAIN RELEVANT

Sean Newman, security strategist, Cisco Security Business Group When Gartner coined the phrase &#822...

25th October, 2014

Image for PROTECTING MOBILE BANKING
Banking

PROTECTING MOBILE BANKING

By Jodi Wadhwa, Vice President Marketing at Arxan Technologies Today, smart phones and devices are i...

24th October, 2014

Image for IT LESSONS FROM iCLOUD: THE INCREASING NEED FOR FILE-CENTRIC SECURITY
Top Stories

IT LESSONS FROM iCLOUD: THE INCREASING NEED FOR FILE-CENTRIC SECURITY

Written by Ryan Kalember, Chief Product Officer, WatchDox I don’t need to tell you about the Apple i...

23rd October, 2014