Please turn on your JavaScript for this page to function normally.
The cost and frequency of cyber attacks on the rise

The cost, frequency and time to resolve cyberattacks continue to rise for the fourth consecutive year, according to a global study by HP and the Ponemon Institute. The 2013 …

What can we learn from ICS/SCADA security incidents?

Increasing numbers of recent security incidents against industrial control systems/SCADA raise questions about the ability of many organisations to respond to critical …

Top IT predictions for 2014 and beyond

Gartner has revealed its top predictions for IT organizations and IT users for 2014 and beyond. The predictions for 2014 combine several disruptive topics — Digital …

SSD adoption grows despite difficult data erasure and recovery

The overwhelming majority (82%) of UK CIOs, CTOs and IT managers predict that their use of SSD technology will increase over the next 12 months, according to new research from …

Unisys Stealth for Mobile solution protects against BYOD issues

Unisys announced the Unisys Stealth for Mobile solution to address the security concerns facing enterprises as growing numbers of their employees use consumer devices at work. …

Microsoft exceedes 100 bulletins for 2013

It’s been an interesting month for the Microsoft Security watchers of the world. If your job depends on securing systems running Windows, you should be eagerly awaiting …

The Apple and WoW effect

Modern living is defined by pop culture phenomena. In the last few months alone, 4G rollouts, the release of smart watches and launch of long-awaited video games have all …

Free secure messaging app from Carnegie Mellon researchers

Carnegie Mellon University CyLab researchers have developed a free smartphone app for iOS and Android users to safely exchange identity data without risk of theft, deception …

Video: Recent advances in IPv6 security

There are a number of factors that make the IPv6 protocol suite interesting from a security standpoint. Firstly, being a new technology, technical personnel has much less …

Users want to access all their content in just one secure place

Are you managing your content, or is your content managing you? An F-Secure survey shows that, with their photos, videos, and other documents scattered across various cloud …

Beginning of a new era: The digital industrial economy

Worldwide IT spending is forecast to reach $3.8 trillion in 2014, a 3.6 percent increase from 2013, but it’s the opportunities of a digital world that have IT leaders …

Webroot delivers data, identity and threat protection

Webroot released the latest updates to its Webroot SecureAnywhere portfolio. The latest release brings new detection technology to block emerging malware and phishing attacks …

Don't miss

Cybersecurity news