cybersecurity

Image for Glyndŵr University Selects ForeScout to Advance Network Security Programme
Technology

Glyndŵr University Selects ForeScout to Advance Network Security Programme

Glyndŵr University, an inspiring and enterprising University based in Wrexham, North Wales, recently...

7th July, 2012

Image for The complexities of sharing data
Technology

The complexities of sharing data

Keith Ricketts, Marketing Director at Becrypt talks us through the complexities of accessing and sha...

3rd July, 2012

Image for Enabling BYOD in the workplace
Technology

Enabling BYOD in the workplace

For some time now IT managers and IT decision-makers have come under increasing pressure to enable t...

29th June, 2012

Image for Banking On A Strategic Rethink Towards IT Security
Technology

Banking On A Strategic Rethink Towards IT Security

By Mark Hyland, UK Country Manager, Fortinet Financial services firms are revamping their strategy f...

27th June, 2012

Image for Business on the cyber war frontline
Business

Business on the cyber war frontline

With society now almost entirely dependent on cyber space it’s little wonder that the overall cost t...

27th June, 2012

Image for Are we due an “Austerity Program” in IT Security Management?
Technology

Are we due an “Austerity Program” in IT Security Management?

By Graeme Nash, Director of Strategic Solutions, Fortinet Growing operational costs; squeezed budget...

27th June, 2012

Image for SecureKey Technologies lands $30M in growth funding
Technology

SecureKey Technologies lands $30M in growth funding

SecureKey Technologies Inc., an online authentication company based in Toronto Canada, has raised $3...

7th June, 2012

Image for ForeScout Security Automation Advances Granarolo Network Defences and Delivers Operational Savings
Technology

ForeScout Security Automation Advances Granarolo Network Defences and Delivers Operational Savings

The Granarolo Group, Italy’s largest dairy provider and a leader in the country’s manufacturing sect...

7th June, 2012

Image for What is IRM (or Information Rights Management) and its strategies
Trading

What is IRM (or Information Rights Management) and its strategies

IRM or Information Rights Management corresponds to a technology protecting sensitive information fr...

18th May, 2012

Image for The Hype around Big Data – What’s it all about?
Technology

The Hype around Big Data – What’s it all about?

Conrad Constantine, Research Team Engineer, AlienVault Why is everyone so hyped over Big Data? Possi...

17th May, 2012

Image for BYOD – It’s Time to Throw Out the Rule Book
Business

BYOD – It’s Time to Throw Out the Rule Book

Grant Taylor, Head of UK operations, Cryptzone Employees have differing views when it comes to what...

15th May, 2012

Image for Threat Intelligence: What to Share?
Technology

Threat Intelligence: What to Share?

  Conrad Constantine, Research Team Engineer, AlienVault   Year after year, I hear the sam...

13th April, 2012