Our website makes use of cookies like most of the websites. In order to deliver a personalised, responsive and improved experience, we remember and store information about how you use it. This is done using simple text files called cookies which sit on your computer. These cookies are completely safe and secure and will never contain any sensitive information. By clicking continue here, you give your consent to the use of cookies by our website.

CCI
Security
Tuesday, 24 March 2015 10:01

DocuSign opens European Hub in Ireland

DocuSign launches its European hub in Dublin which will serve as a hub for technical innovation

A survey by Corero Network finds DDoS attacks have changed to be are shorter in length and more frequent and are designed to fool even the most sophisticated anti-DDoS solutions

David Tebbutt explores the EU’s attempt to produce a cloud standard for security, with an analysis of the recommendations of the ENISA for European Government clouds

IBM figures show a staggering rise in the number of designer vulnerabilities – aka Designer Vulns - and security incidents targeting businesses.

Mobile enterprise environments are increasingly targeted by embedded spyware, adware and back-doors, according to analytics from Veracode’s cloud-based security platform

Chris Sigley explains why businesses need to abandon storing confidential data on consumer cloud services

Computer hacking is taking a darker turn; hackers are no longer kids seeing if they can crack codes, they are now sophisticated targetted attacks from organisations who are there to cause havoc explains David Davies.    

Wednesday, 04 March 2015 13:51

What to look for in your Cloud provider?

With 90% of the world’s data generated within the last two years, storage and security is under scrutiny as the likelihood of data breaches and leakages has greatly increased. Says 

Box has acquired US start up Subspace to help deliver box securely across multiple devices for sectors where strict security and compliance are enforced

Tuesday, 03 March 2015 11:28

AVG launches secure sign-on solution

New secure sign-on tools for cloud applications on mobile devices are aimed at IT providers and business owner 

Kroll Ontrack survey reveals solid state disk (SSD) technology highly adopted, but not infallible

IT departments are failing to explain their cloud usage policy to the rest of the business, and as a consequence more than 1 in 5 employees are uploading sensitive information to the cloud, finds a new Trustmarque report.

Microsoft announce it is the first major cloud provider to adopt the world’s first international standard for cloud privacy as well as conforming to British Standards.

Capgemini launches Cybersecurity Global Service Line a new initiative to encompass security across cloud, on premise and the Internet of Things and finds IoT players are worried about the devices security.

DNS Guardian “guarantees” data integrity and continuity of web services for businesses, even during a DNS attack.

Thursday, 05 February 2015 02:16

Robust and resilient security?

Following a spate of high profile and costly cyber incidents the focus on protecting corporate and business networks has never been so keen. Yet nailing down robust cyber security policies can seem like a distraction from core business but it’s really quite straightforward; while failure to do so can have seriously damaging consequences.

Tom Neaves, Managing Consultant at Trustwave explains why cyber security is no longer solely an “IT issue” mainly because more than just the IT department is feeling the pain.

MPs and peers call for greater adoption of cloud services in the public sector and support G-Cloud, but reveal data protection concerns

Dell has brought in Firehost to help them create secure managed private clouds services for businesses looking for compliance with PCI, HiPPA and the forthcoming EU Data Protection Reform Acts.

IT professionals feel Government initiatives like CERT-UK and Operation Waking Shark II have actively helped them raise awareness of cybersecurity to senior management.

The GHOST Linux vulnerability allows attackers to remotely control systems without any administrator credentials simply by sending an email. Are your systems protected?

A new survey finds businesses are failing to delete data as employees leave and employees aren’t afraid to access sensitive data after they’ve left and are willing to sell passwords for as little as £100.

Veeam VP, Ian Wells, explains why in terms of data protection, moving to the cloud does not mean reinventing the wheel

A new report from the Ponemon Institute reveals that enterprises spend $1.3 million (£860,000) a year dealing with false positive cyber security alerts, which equals nearly 21,000 hours in wasted time.

The UK and US are in talks about cyber-security including a series of joint war games to simulate and test online attacks on the financial services industries in the City of London and Wall Street

Friday, 16 January 2015 11:13

Let's play Global Thermonuclear War.

The UK and the US governments are planning on collaborating on war games to test cyber threats and as far as we’re concerned it can’t come quick enough.

FTSE 350 boards are unaware of the real level of risks from cyber threats however the number of businesses that consider cyber threats in pre-contract due-diligence is up significantly.

Akamai’s latest State of the Internet report shows DDoS attacks on high-tech businesses are up and the delivery of those attacks is getting more sophisticated and harder to prevent

Newly implemented security standards bring government levels of security to Avere’s hybrid cloud storage solution FXT Edge

Monday, 05 January 2015 11:17

Could your data be breaking the law?

James Walker explains why we need a set of common standards so that any organisation can classify its data according to value, criticality, personal or juridical sensitivity and why software defined networks (SDN) will help us get there.

cci-app-store-apple

CCi-with-android

255x635 banner2-compressed