Observability in 2020: A manifesto
risk managementwhitepaper

Observability in 2020: A manifesto

Ten principles for observability success
24 Nov 2020
Leadership compass: Privileged Access Management
Priviledged Access Managenment whitepaper
risk managementwhitepaper

Leadership compass: Privileged Access Management

Securing privileged accounts in a high-risk environment
24 Nov 2020
Bigleaf Networks’ AI-powered feature translates network events into actionable risks
Bigleaf risk monitoring dashboard
risk

Bigleaf Networks’ AI-powered feature translates network events into actionable risks

AI-widget identifies risks triggered by a site and highlights only the top three with actionable solutions
9 Oct 2020
Digital transformation? Don’t bother unless you plan to address risk
Graphic representing security in either data protection or cyber security contexts
risk management

Digital transformation? Don’t bother unless you plan to address risk

Migrating to digital plains brings a host of new threats to your door that if left unaddressed will curb DX benefits
27 Feb 2020
Digital Risk Report 2020
Whitepaperwhitepaper

Digital Risk Report 2020

A global view into the impact of digital transformation on risk and security management
14 Feb 2020
Your guide to managing cloud transformation risk
cloud securitywhitepaper

Your guide to managing cloud transformation risk

Realise the benefits. Mitigate the risks
11 Feb 2020
Six ways boards can step up support for cyber security
Business strategy

Six ways boards can step up support for cyber security

Security is an enterprise-wide risk management concern, not merely an IT issue
27 Jan 2020
Micro Focus suffers shares slump amid revenue fears
Acquisition

Micro Focus suffers shares slump amid revenue fears

CEO Chris Hsu leaves as analyst points finger at HPE merger difficulties
19 Mar 2018
Apple and Cisco tempt businesses with cybersecurity discount
risk management

Apple and Cisco tempt businesses with cybersecurity discount

Kaspersky claims it sets a "worrying precedent" of insurance companies claiming to be better informed on security
6 Feb 2018
LinkedIn cannot block third-parties from data access
LinkedIn
business intelligence (BI)

LinkedIn cannot block third-parties from data access

The ruling may have implications for social media users wishing to control how their data is collected
15 Aug 2017
Read Google's five rules for human-friendly AI
public sector

Read Google's five rules for human-friendly AI

Google updates Asimov's Three Laws of Robotics for AI developers
22 Jun 2016
Microsoft targets .NET Core with new bug bounty rewards
Security

Microsoft targets .NET Core with new bug bounty rewards

Redmond offers more cash prizes for sourcing errors in its upcoming web frameworks
8 Jun 2016
Man who 'deleted company with one line of code' admits hoax
Network & Internet

Man who 'deleted company with one line of code' admits hoax

Marco Masala admits the story was a viral marketing ploy
18 Apr 2016
Uber launches bug bounty programme with $10k prize
Security

Uber launches bug bounty programme with $10k prize

Keen bug tracers will need to find five genuine bugs to receive their first payout
23 Mar 2016
‘Worst passwords’ list 2015 topped by 123456
Security

‘Worst passwords’ list 2015 topped by 123456

Annual list of most commonly used passwords included Star Wars-related terms
20 Jan 2016
Lumension takes the wraps off LEMSS 7.3
Security

Lumension takes the wraps off LEMSS 7.3

LEMSS 7.3 promises to protect against more pernicious attacks, such as RMI, says vendor.
25 Apr 2013
Cryptzone CEO gives his account of the events that led to
Deal torn up
Security

Cryptzone CEO gives his account of the events that led to

Security vendor's CEO denies challenges around acquisitions were factor in NETconsent's retreat.
7 Dec 2012
Cambridge University boffins to combat rise of the machines
Brain
risk management

Cambridge University boffins to combat rise of the machines

Scientists to look at ways to see off Terminator-style threat
26 Nov 2012
Data security: is breach mitigation all that's left?
security on computer
Security

Data security: is breach mitigation all that's left?

If you accept the premise that it's inevitable your enterprise network will be attacked, and most likely breached, then is mitigation really where the…
30 Jul 2012
RSA's Art Coviello: Security industry going through hell
Security hell
Security

RSA's Art Coviello: Security industry going through hell

A year after the hack on RSA, Art Coviello says the entire security industry has been going through 'hell.'
28 Feb 2012
Security giants go cloud crazy with RSA launches
Cloud security
Security

Security giants go cloud crazy with RSA launches

HP and RSA are two of the biggest firms launching cloudy products on the first day of the major security conference.
27 Feb 2012
Are you ready to launch IPv6 securely?
IPv6
Security

Are you ready to launch IPv6 securely?

Davey Winder says that despite the unnecessary scare stories, businesses need to think about migrating to IPv6 securely now.
24 Feb 2012
Juniper splashes £80m on 'intrusion deception' firm
Security
Security

Juniper splashes £80m on 'intrusion deception' firm

The networking firm buys Mykonos, which looks to catch cyber criminals during their reconnaissance phase.
23 Feb 2012