A burst water main in Kennington put many companies’ business continuity plans to the test as buildings flooded, roads closed and bus…
Browsing: Identity and Access Management (IAM)
July 4th marks the peak of summer here in the United States, and with it brings an uptick in travel.…
2 SSH vulnerabilities have been discovered on Cisco Virtual Appliances because the virtual machines running on VMWare and KVM virtualization…
Introduction Partnering for Cyber Resilience was compiled by the World Economic Forum’s Partnering for Cyber Resilience ( the complete paper…
ENITSE Enterprise IT Security Conference & Exhibition will be held on 04-05 November 2015 in Istanbul – Turkey. ENITSE is…
In response to the recent survey from LogRhythm*, I find it shocking that almost half of organisations that have suffered…
Cyber London, Europe’s first dedicated cyber security accelerator programme, today held its first ‘Demo Day’ in Hammersmith, London. Founders of…
Damballa, the experts in advanced threat protection and containment, today released its Q2 2015 State of Infections Report, highlighting how…
Mobile Gaming Applications Hit Hardest, With Close to 2 Million Unauthorised Releases Expected in 2015 Arxan Technologies, the leading provider…
New Virtual f(n) Delivers Router and Firewall Capabilities Entirely in Software Masergy Communications Inc., a global leader in secure networking…