This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

FEATURED

Apple unveils iOS 8.0 - security from the ground upwards

Apple unveils iOS 8.0 - security from the ground upwards

iOS 8.0 - 1.1GB large, but with Apple providing lots of security patches and upgrades...

LATEST NEWS

Card and banking fraud back on the rise again

Card and banking fraud back on the rise again

Banking and card fraud back on the rise again says the FFA UK as crime increasingly moves online.

eBay downplays significance of `old school' XSS attack on its auction portal

eBay downplays significance of `old school' XSS attack on its auction portal

eBay vulnerable to XSS attack enabling re-direction of users says BBC.

Defending Critical Infrastructure: only 6% of incidents malicious

Defending Critical Infrastructure: only 6% of incidents malicious

The weather, or even simple mis-configuration, are threats to critical infrastructure, but in an emergency, could government now run privatised utilities?

PRODUCT REVIEWS

ThreatTrack Security VIPRE Business Premium v6.5

starstarstarstar¾
Helps enterprises manage and control endpoint security by combining a small-footprint, anti-virus agent with integrated patch management and mobile device management (MDM) capability.

Barracuda Spam Firewall 400 v6.1

starstarstarstarstar
The Barracuda Spam Firewall is an integrated hardware and software solution designed to protect the email server from spam, virus, spoofing, phishing and spyware attacks.

WatchGuard XCS 580 v10.0

starstarstarstarstar
The WatchGuard XCS 580 (Extensible Content Security Appliance) is an easy-to-use, all-inclusive email and web appliance that provides security and privacy of inbound and outbound traffic.

Virtual Events

Opinions

The (grim) reality of password security

The (grim) reality of password security

There are security vulnerabilities when using passwords, but Tyler Moffitt says that there are steps that you can and should take to make sure your data less easy to access.

The new rise of biometrics

The new rise of biometrics

Biometric id options need appropriate mobile computing support to ensure that they too are not compromised says Jon Geater.

Cyber risk management: A boardroom issue

Cyber risk management: A boardroom issue

Having comprehensive cyber risk policies that are not followed can be as detrimental as not having a policy at all says Peter Given.Good who advises that good risk-insurance will demand appropriate procedures are both in place and implemented.

Director's Cut

Sign up to our newsletters