IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more
‘Worst passwords’ list 2015 topped by 123456
Password label
Security

‘Worst passwords’ list 2015 topped by 123456

Annual list of most commonly used passwords included Star Wars-related terms
20 Jan 2016
Lumension takes the wraps off LEMSS 7.3
Security

Lumension takes the wraps off LEMSS 7.3

LEMSS 7.3 promises to protect against more pernicious attacks, such as RMI, says vendor.
25 Apr 2013
Cryptzone CEO gives his account of the events that led to
Deal torn up
Security

Cryptzone CEO gives his account of the events that led to

Security vendor's CEO denies challenges around acquisitions were factor in NETconsent's retreat.
7 Dec 2012
Cambridge University boffins to combat rise of the machines
Brain
risk management

Cambridge University boffins to combat rise of the machines

Scientists to look at ways to see off Terminator-style threat
26 Nov 2012
Data security: is breach mitigation all that's left?
security on computer
Security

Data security: is breach mitigation all that's left?

If you accept the premise that it's inevitable your enterprise network will be attacked, and most likely breached, then is mitigation really where the…
30 Jul 2012
RSA's Art Coviello: Security industry going through hell
Security hell
Security

RSA's Art Coviello: Security industry going through hell

A year after the hack on RSA, Art Coviello says the entire security industry has been going through 'hell.'
28 Feb 2012
Security giants go cloud crazy with RSA launches
Cloud security
Security

Security giants go cloud crazy with RSA launches

HP and RSA are two of the biggest firms launching cloudy products on the first day of the major security conference.
27 Feb 2012
Are you ready to launch IPv6 securely?
IPv6
Security

Are you ready to launch IPv6 securely?

Davey Winder says that despite the unnecessary scare stories, businesses need to think about migrating to IPv6 securely now.
24 Feb 2012
Juniper splashes £80m on 'intrusion deception' firm
Security
Security

Juniper splashes £80m on 'intrusion deception' firm

The networking firm buys Mykonos, which looks to catch cyber criminals during their reconnaissance phase.
23 Feb 2012
IBM builds on Q1 Labs acquisition with QRadar boost
Security
Security

IBM builds on Q1 Labs acquisition with QRadar boost

Big Blue launches an updated version of the QRadar SIEM software it acquired after buying Q1 Labs last year.
22 Feb 2012
Symantec: Disable your pcAnywhere software
Hacking
Security

Symantec: Disable your pcAnywhere software

The security giant advises users against running pcAnywhere until it has fixed vulnerabilities highlighted by a source code leak.
26 Jan 2012
Google dumps disaster recovery product amidst clean out
Tech in bin
Security

Google dumps disaster recovery product amidst clean out

The internet giant dumps the Google Message Continuity product to focus on its Apps lineup.
23 Jan 2012
Symantec: 2006 hack leaked source code
Symantec
Security

Symantec: 2006 hack leaked source code

The security giant publicly discloses a breach of its network - almost six years after it took place.
18 Jan 2012
Oracle issues 78 vulnerability patches
Oracle
Security

Oracle issues 78 vulnerability patches

Combined with Microsoft and Adobe patches, Oracle has made IT departments' lives a little harder this month.
17 Jan 2012
Microsoft and Adobe plan busy January patch days
Patch Tuesday
Security

Microsoft and Adobe plan busy January patch days

IT departments will have a busy month of patching to kick off 2012.
9 Jan 2012
Q&A: All about BlackBerry Mobile Fusion
BlackBerry Mobile Fusion website homepage
Mobile

Q&A: All about BlackBerry Mobile Fusion

We spoke to Tim Hodkinson, RIM's director of enterprise marketing for Europe, the Middle East and Africa (EMEA) about the company's latest announcemen…
30 Nov 2011
GFI WebMonitor 2011 R3 review
GFI WebMonitor 2011 R3
Security

GFI WebMonitor 2011 R3 review

GFI's WebMonitor software focuses on providing stiff web content security and costs a lot less than an appliance. Dave Mitchell loads it up in the lab…
25 Nov 2011
Business of IT: Building a business case for security
computer security
Security

Business of IT: Building a business case for security

Security can be both the unseen hero and the weakest link in an organisation, so how do you make the case to spend enough to protect your organisation…
9 Nov 2011
Security software rebounded strongly in 2010
Graph rise
risk management

Security software rebounded strongly in 2010

Gartner finds the security software market has reasons to be cheerful following a decent 2010.
7 Jun 2011
LastPass passwords compromised by hack
Passwords
risk management

LastPass passwords compromised by hack

LastPass passwords not necessarily the last password you’ll ever need.
6 May 2011
GCHQ says BlackBerry is safest
Mobile
risk management

GCHQ says BlackBerry is safest

GCHQ division CESG says BlackBerrys are the safest phones for sensitive Government data, as it offers smartphone security guidance.
11 Apr 2011
PaaS to ‘engulf’ software industry
Cloud computing
cloud computing

PaaS to ‘engulf’ software industry

This year will be a massive one for Platform-as-a-Service and users can expect plenty of innovation in the market, says Gartner.
14 Mar 2011
Most employees admit ‘risk taking’
Data security
Security

Most employees admit ‘risk taking’

Employees appear happy to risk corporate data, a Symantec study finds.
27 Jan 2011