Marsh McLennan reveals its cyber risk analytics center
Hand hovering over laptop with padlock graphic superimposed
risk management

Marsh McLennan reveals its cyber risk analytics center

The center combines the expertise of Marsh, Guy Carpenter, Mercer, and Oliver Wyman
15 Oct 2021
Six ways boards can step up support for cyber security
A corporate boardroom filled with empty chairs against a long table
Business strategy

Six ways boards can step up support for cyber security

Security is an enterprise-wide risk management concern, not merely an IT issue
22 Jul 2021
How to increase cyber resilience within your organisation
Cyber resilience for dummies - How to improve cyber resilience within your organisation - whitepaper from Mimecastwhitepaper
Whitepaper

How to increase cyber resilience within your organisation

Cyber resilience for dummies
15 Jul 2021
Digital transformation and addressing risk
Graphic representing security in either data protection or cyber security contexts
risk management

Digital transformation and addressing risk

How has your organisation’s risk profile changed in recent years due to its digital transformation?
24 Mar 2021
Observability in 2020: A manifesto
whitepaper
risk management

Observability in 2020: A manifesto

Ten principles for observability success
24 Nov 2020
Leadership compass: Privileged Access Management
Priviledged Access Managenment whitepaperwhitepaper
risk management

Leadership compass: Privileged Access Management

Securing privileged accounts in a high-risk environment
24 Nov 2020
Bigleaf Networks’ AI-powered feature translates network events into actionable risks
Bigleaf risk monitoring dashboard
risk

Bigleaf Networks’ AI-powered feature translates network events into actionable risks

AI-widget identifies risks triggered by a site and highlights only the top three with actionable solutions
9 Oct 2020
Digital Risk Report 2020
whitepaper
Whitepaper

Digital Risk Report 2020

A global view into the impact of digital transformation on risk and security management
14 Feb 2020
Your guide to managing cloud transformation risk
whitepaper
cloud security

Your guide to managing cloud transformation risk

Realise the benefits. Mitigate the risks
11 Feb 2020
Micro Focus suffers shares slump amid revenue fears
Acquisition

Micro Focus suffers shares slump amid revenue fears

CEO Chris Hsu leaves as analyst points finger at HPE merger difficulties
19 Mar 2018
Apple and Cisco tempt businesses with cybersecurity discount
risk management

Apple and Cisco tempt businesses with cybersecurity discount

Kaspersky claims it sets a "worrying precedent" of insurance companies claiming to be better informed on security
6 Feb 2018
LinkedIn cannot block third-parties from data access
LinkedIn
business intelligence (BI)

LinkedIn cannot block third-parties from data access

The ruling may have implications for social media users wishing to control how their data is collected
15 Aug 2017
Read Google's five rules for human-friendly AI
public sector

Read Google's five rules for human-friendly AI

Google updates Asimov's Three Laws of Robotics for AI developers
22 Jun 2016
Microsoft targets .NET Core with new bug bounty rewards
Security

Microsoft targets .NET Core with new bug bounty rewards

Redmond offers more cash prizes for sourcing errors in its upcoming web frameworks
8 Jun 2016
Man who 'deleted company with one line of code' admits hoax
Network & Internet

Man who 'deleted company with one line of code' admits hoax

Marco Masala admits the story was a viral marketing ploy
18 Apr 2016
Uber launches bug bounty programme with $10k prize
Security

Uber launches bug bounty programme with $10k prize

Keen bug tracers will need to find five genuine bugs to receive their first payout
23 Mar 2016
‘Worst passwords’ list 2015 topped by 123456
Security

‘Worst passwords’ list 2015 topped by 123456

Annual list of most commonly used passwords included Star Wars-related terms
20 Jan 2016
Lumension takes the wraps off LEMSS 7.3
Security

Lumension takes the wraps off LEMSS 7.3

LEMSS 7.3 promises to protect against more pernicious attacks, such as RMI, says vendor.
25 Apr 2013
Cryptzone CEO gives his account of the events that led to
Deal torn up
Security

Cryptzone CEO gives his account of the events that led to

Security vendor's CEO denies challenges around acquisitions were factor in NETconsent's retreat.
7 Dec 2012
Cambridge University boffins to combat rise of the machines
Brain
risk management

Cambridge University boffins to combat rise of the machines

Scientists to look at ways to see off Terminator-style threat
26 Nov 2012
Data security: is breach mitigation all that's left?
security on computer
Security

Data security: is breach mitigation all that's left?

If you accept the premise that it's inevitable your enterprise network will be attacked, and most likely breached, then is mitigation really where the…
30 Jul 2012
RSA's Art Coviello: Security industry going through hell
Security hell
Security

RSA's Art Coviello: Security industry going through hell

A year after the hack on RSA, Art Coviello says the entire security industry has been going through 'hell.'
28 Feb 2012
Security giants go cloud crazy with RSA launches
Cloud security
Security

Security giants go cloud crazy with RSA launches

HP and RSA are two of the biggest firms launching cloudy products on the first day of the major security conference.
27 Feb 2012