New Disaster Recovery and Business Continuity Products

Product Innovation and Global Growth

Product Innovation and Global Growth Cap Successful Second Quarter Datto, innovative provider of comprehensive data backup, recovery and business continuity solutions, has announced the company achieved rapid growth in the second quarter of 2015. Datto introduced new products, held its first-ever EMEA Partner Conference and expanded its distribution further into the UK, Ireland and Europe. […]

Hackers Publishing the Details of Ashley Madison Users

Hackers Publishing the Details of Ashley Madison Users

Matt Newing, CEO at commented on the latest news that hackers are threatening to expose millions of Ashley Madison users in a massive data breach at the cheating website. [su_note note_color=”#ffffcc” text_color=”#00000″]Matt Newing, CEO at Consumer trust in a business has never been so critical. Hackers publishing the details of 37 million Ashley […]

IT Professionals Forced to Adopt Smart Devices

IT Professionals Forced to Adopt Smart Devices

Tripwire Survey Examines Views of 270 Information Security Professionals at Annual Information Security Conference Tripwire, Inc., a leading global provider of advanced threat, security and compliance management solutions, announced the results of a survey of over 270 attendees at Infosecurity Europe 2015 in Olympia, London in the United Kingdom. Research firm IDC anticipates there will […]

Pushing Emergency Update for Internet Explorer Vulnerability

Internet Explorer Vulnerability

Microsoft has issued an emergency patch for Internet Explorer outside of its Patch Tuesday Monthly schedule following a zero-day vulnerability, dubbed CVE-2015-2502. The vulnerability could allow an attacker to hijack control of your computer via Internet Explorer – just by you visiting a boobytrapped webpage. Lane Thames, Software Development Engineer and Security Researcher at Tripwire gives insight […]

Learn Data Security Lessons from Hacker Horror Stories

Hacker Horror Stories

You should never have one password for all your accounts. Yet you probably recycle some passwords more than is recommended. If hackers get their hands on your email password, they can systematically change the passwords of your other accounts. Instead, use many different, randomly generated passwords. This can decrease your risk, though not eliminate it […]

Next Generation Breach Prevention and Detection Solution


Change Tracker Gen 7 marks the next generation of continuous breach prevention with intelligent file integrity monitoring and security configuration management powered by Closed-Loop Intelligent Change Control New Net Technologies, (NNT), a global provider of data security and compliance software solutions, announces the availability of the next generation of NNT Change Tracker™, its flagship system […]

Developing a Cybersecurity Assessment Tool

Cybersecurity Assessment Tool

In light of the increasing volume and sophistication of cyber threats, organizations needs to identify their relevant risk, determine their cybersecurity posture and act upon it. That much is clear, but it is easier said than done. Organizations needs not only an agreed methodology to work by, but also a tool to help them achieve […]