Visit/business-strategy/risk-management/354865/digital-transformation-dont-bother-unless-you-plan-to
Graphic representing security in either data protection or cyber security contexts
risk management

Digital transformation? Don’t bother unless you plan to address risk

Migrating to digital plains brings a host of new threats to your door that if left unaddressed will curb DX benefits
27 Feb 2020
Visit/business-strategy/risk-management/354778/digital-risk-report-2020
Whitepaperwhitepaper

Digital Risk Report 2020

A global view into the impact of digital transformation on risk and security management
14 Feb 2020
Visit/cloud/cloud-security/354743/your-guide-to-managing-cloud-transformation-risk
cloud securitywhitepaper

Your guide to managing cloud transformation risk

Realise the benefits. Mitigate the risks
11 Feb 2020
Visit/strategy/29101/six-ways-boards-can-step-up-support-for-cyber-security
Business strategy

Six ways boards can step up support for cyber security

Security is an enterprise-wide risk management concern, not merely an IT issue
27 Jan 2020
Advertisement
Visit/acquisition/30791/micro-focus-suffers-shares-slump-amid-revenue-fears
Acquisition

Micro Focus suffers shares slump amid revenue fears

CEO Chris Hsu leaves as analyst points finger at HPE merger difficulties
19 Mar 2018
Visit/risk-management/30469/apple-and-cisco-tempt-businesses-with-cybersecurity-discount
risk management

Apple and Cisco tempt businesses with cybersecurity discount

Kaspersky claims it sets a "worrying precedent" of insurance companies claiming to be better informed on security
6 Feb 2018
Visit/business-intelligence/29223/judge-says-linkedin-cannot-block-third-parties-from-accessing-profile
LinkedIn
business intelligence (BI)

LinkedIn cannot block third-parties from data access

The ruling may have implications for social media users wishing to control how their data is collected
15 Aug 2017
Visit/public-sector/26766/read-googles-five-rules-for-human-friendly-ai
public sector

Read Google's five rules for human-friendly AI

Google updates Asimov's Three Laws of Robotics for AI developers
22 Jun 2016
Advertisement
Visit/security/26694/microsoft-targets-net-core-with-new-bug-bounty-rewards
Security

Microsoft targets .NET Core with new bug bounty rewards

Redmond offers more cash prizes for sourcing errors in its upcoming web frameworks
8 Jun 2016
Visit/networking/26363/man-who-deleted-company-with-one-line-of-code-admits-it-was-all-a-hoax
Network & Internet

Man who 'deleted company with one line of code' admits hoax

Marco Masala admits the story was a viral marketing ploy
18 Apr 2016
Advertisement
Visit/security/26256/uber-launches-bug-bounty-programme-with-10k-prize
Security

Uber launches bug bounty programme with $10k prize

Keen bug tracers will need to find five genuine bugs to receive their first payout
23 Mar 2016
Visit/security/25894/worst-passwords-list-2015-topped-by-123456
Security

‘Worst passwords’ list 2015 topped by 123456

Annual list of most commonly used passwords included Star Wars-related terms
20 Jan 2016
Visit/security/19703/lumension-takes-wraps-new-enterprise-security-product
Security

Lumension takes the wraps off LEMSS 7.3

LEMSS 7.3 promises to protect against more pernicious attacks, such as RMI, says vendor.
25 Apr 2013
Visit/644575/cryptzone-ceo-gives-his-account-of-the-events-that-led-to-netconsent-mbo
Deal torn up
Security

Cryptzone CEO gives his account of the events that led to

Security vendor's CEO denies challenges around acquisitions were factor in NETconsent's retreat.
7 Dec 2012
Advertisement
Visit/644335/cambridge-university-boffins-to-combat-rise-of-the-machines
Brain
risk management

Cambridge University boffins to combat rise of the machines

Scientists to look at ways to see off Terminator-style threat
26 Nov 2012
Visit/641989/data-security-is-breach-mitigation-all-thats-left
security on computer
Security

Data security: is breach mitigation all that's left?

If you accept the premise that it's inevitable your enterprise network will be attacked, and most likely breached, then is mitigation really where the…
30 Jul 2012
Visit/639205/rsas-art-coviello-security-industry-going-through-hell
Security hell
Security

RSA's Art Coviello: Security industry going through hell

A year after the hack on RSA, Art Coviello says the entire security industry has been going through 'hell.'
28 Feb 2012
Visit/639178/security-giants-go-cloud-crazy-with-rsa-launches
Cloud security
Security

Security giants go cloud crazy with RSA launches

HP and RSA are two of the biggest firms launching cloudy products on the first day of the major security conference.
27 Feb 2012
Visit/639139/are-you-ready-to-launch-ipv6-securely
IPv6
Security

Are you ready to launch IPv6 securely?

Davey Winder says that despite the unnecessary scare stories, businesses need to think about migrating to IPv6 securely now.
24 Feb 2012
Visit/639091/juniper-splashes-80m-on-intrusion-deception-firm
Security
Security

Juniper splashes £80m on 'intrusion deception' firm

The networking firm buys Mykonos, which looks to catch cyber criminals during their reconnaissance phase.
23 Feb 2012
Advertisement
Visit/639061/ibm-builds-on-q1-labs-acquisition-with-qradar-boost
Security
Security

IBM builds on Q1 Labs acquisition with QRadar boost

Big Blue launches an updated version of the QRadar SIEM software it acquired after buying Q1 Labs last year.
22 Feb 2012
Visit/638524/symantec-disable-your-pcanywhere-software
Hacking
Security

Symantec: Disable your pcAnywhere software

The security giant advises users against running pcAnywhere until it has fixed vulnerabilities highlighted by a source code leak.
26 Jan 2012
Visit/638443/google-dumps-disaster-recovery-product-amidst-clean-out
Tech in bin
Security

Google dumps disaster recovery product amidst clean out

The internet giant dumps the Google Message Continuity product to focus on its Apps lineup.
23 Jan 2012