This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

FEATURED

Apple unveils iOS 8.0 - security from the ground upwards

Apple unveils iOS 8.0 - security from the ground upwards

iOS 8.0 - 1.1GB large, but with Apple providing lots of security patches and upgrades...

LATEST NEWS

New Androids will encrypt your data just like iPhones

New Androids will encrypt your data just like iPhones

Google has promised that the next generation of Android phones will automatically encrypt data - preventing police and other agencies snooping on their users.

Russian cyber attack exploits Scottish independence vote

Russian cyber attack exploits Scottish independence vote

UK oil firms warned to guard against new campaign as Russian malware exploits Scottish independende vote.

Card and banking fraud back on the rise again

Card and banking fraud back on the rise again

Banking and card fraud back on the rise again says the FFA UK as crime increasingly moves online.

PRODUCT REVIEWS

ThreatTrack Security VIPRE Business Premium v6.5

starstarstarstar¾
Helps enterprises manage and control endpoint security by combining a small-footprint, anti-virus agent with integrated patch management and mobile device management (MDM) capability.

Barracuda Spam Firewall 400 v6.1

starstarstarstarstar
The Barracuda Spam Firewall is an integrated hardware and software solution designed to protect the email server from spam, virus, spoofing, phishing and spyware attacks.

WatchGuard XCS 580 v10.0

starstarstarstarstar
The WatchGuard XCS 580 (Extensible Content Security Appliance) is an easy-to-use, all-inclusive email and web appliance that provides security and privacy of inbound and outbound traffic.

Virtual Events

Opinions

The (grim) reality of password security

The (grim) reality of password security

There are security vulnerabilities when using passwords, but Tyler Moffitt says that there are steps that you can and should take to make sure your data less easy to access.

The new rise of biometrics

The new rise of biometrics

Biometric id options need appropriate mobile computing support to ensure that they too are not compromised says Jon Geater.

Cyber risk management: A boardroom issue

Cyber risk management: A boardroom issue

Having comprehensive cyber risk policies that are not followed can be as detrimental as not having a policy at all says Peter Given.Good who advises that good risk-insurance will demand appropriate procedures are both in place and implemented.

Director's Cut

Sign up to our newsletters