Our website makes use of cookies like most of the websites. In order to deliver a personalised, responsive and improved experience, we remember and store information about how you use it. This is done using simple text files called cookies which sit on your computer. These cookies are completely safe and secure and will never contain any sensitive information. By clicking continue here, you give your consent to the use of cookies by our website.

Thursday, 28 May 2015 03:01

Okta protects 50 million Google logins

Okta delivers an enhanced identity and mobility management solution for Google for Work, and surpasses 50 millionth Google Apps login

limited visibility and control are the key challenges confronting IT teams as they look to keep sensitive data secure in cloud deployments

IT departments need to empower employees to use the cloud apps they want, but mitigated with a real-time visibility into how those cloud applications are being used

Martin Sugden looks at how an organisation should react when they suffer an internal data breach and what measures they should be taking to prevent the breach in the first instance.

The first standard for protecting personal data in the cloud is approaching its first birthday and is proving to be a genuine help for cloud service users in managing their data protection legal obligations

Monday, 18 May 2015 10:25

Monday morning is malware morning

The employee is now the organisation’s perimeter as new research shows a massive increase in malware detections on Monday mornings when users reconnect their devices to the corporate network.

Ping Identity has seen a significant growth in the corporate market as a quarter of Fortune 500 enterprises now depend on Ping to secure access to cloud and mobile apps

Wednesday, 13 May 2015 17:31

Has your VM got a floppy vulnerability?

Researchers have discovered the Venom buffer-overflow vulnerability in many of today's most popular virtual machine platforms 

Increasing cloud adoption, remote/mobile access and rising network traffic are creating significant new demands on existing network infrastructure

Stuart Hooson says businesses need to smarten their data security or risk substantial corporate loss

Around 60% of BYOD workers do not involve their company IT support in setting up their devices

More than a third of cyber-attacks still go undetected. The solution according to analysts IDC is a better grasp of big data with more pro-active analytics

Radware launches a new fully-managed hybrid cloud web application firewall service to protect against web application attacks. 

Research shows test and development environments create nearly twice as many requests to restore data than production environments.

Netskope launches a new on-premise cloud security solution for highly-regulated organisations and updates Netskope Active Platform to version 2.5

Office 365 gets an additional automation and security layer via Microsoft’s new Office 365 Management Activity application program interface (API).

Corero is to integrate its on-premise DDoS protection with Verisigns cloud-based DDoS solution.

The internet is a delivery device and a bottleneck and it’s holding back the growth of cloud says Ajit Gupta. So what’s the solution?

Lockheed Martin and Restoration Partners are partnering on a new initiative to grow technology businesses with the Virtual Technology Cluster (VTC)

Ed Macnair explores how you transparently enforce security policies without intervening in the end user experience that people have grown to enjoy from cloud related services

The new Global Compliance Resource Centre is an interactive online resource with details of privacy laws in over 80 countries

Informatica’s latest security solution provides organisations with the ability to secure data and identify potential threats across on-premise, public, private and hybrid cloud.

Blue Coat’s new technology automatically pre-filters recognised threats found in email, web, and network traffic and enables security teams to focus on the newest and most dangerous threats.

The Vormetric Data Security Platform has been extended to protect data inside public cloud services including Amazon S3 and Box

David Tebbutt weighs up the arguments between the authorities, who just want to snoop, and businesses, who want to protect their data.

What happens if it all goes wrong? Do you have access to your cloud providers’ server logs to do a thorough forensic investigation? Nick Pollard looks at some of the challenges a cloud SLA can create. 

Enterprises average 1,555 data partners, but 30% of the data they share is potentially shared with high-risk partners who could compromise their security.

More than half of organisations have had data stolen as a result of DDoS and 40% estimate losses of over £100,000 per hour at peak times during a DDoS outage

A new survey finds that ALL (100%) of UK Organisations surveyed suffer multiple attacks on keys and certificates in the last year with the cost of a successful attack averaging £33 million

A damning Ovum report claims cloud service providers are failing to adequately protect business data from new security threats



255x635 banner2-compressed