Research from Kaspersky Lab shows that the debate over whether ransomware victims should ‘pay up’ could be redundant because large numbers of…
Browsing: Identity and access management (IAM)
According to a recent Gartner forecast analysis, by 2018, ninety percent of organizations will implement at least one form of…
Following the news on the government’s 1.9 billion announcement in cyber defence spending, IT security experts from Corero Network Security, Glasswall…
‘Paper free’ has been a buzz word for around thirty years now[i]. It’s a phrase that conjures up images of…
“Do you have any insect repellent? I’ve been told my computer has a bug.” There is no doubting that cyber…
As National Cybersecurity Awareness Month ends today, Centrify reminds businesses to implement cybersecurity best practices Bracknell UK. Centrify, the leader in…
DevOps is now being met by the OpsDev movement, which some say is just NetOps with SDN thrown in. But…
Conventional approaches to encrypting data-in-transit such as SSL and IPSec are designed for wired networks with fast speed and reliable…
Every day, consumers and businesses alike share and expose more of themselves online. For hackers, the lure of this data…
Data breaches continue around the globe – news that a data breach has exposed over a million personal and medical records of Australian…