This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

FEATURED

China may be targeting medical firms for IP data

China may be targeting medical firms for IP data

Very little companies can do to defend themselves against state-sponsored attacks, says Storm Guidance director Sarb Sembhi.

MORE NEWS

Cyber Security Challenge joins with GCHQ for security development programme

Cyber Security Challenge joins with GCHQ for security development programme

The Cyber Security Challenge is linking with GCHQ to develop counter-espionage and cyber security skills for the real world.

Video games company hit by 38-day DDoS attack

Video games company hit by 38-day DDoS attack

51,000-plus terabits of data thrown against client, says IP security firm

US Nuclear Regulatory Commission successfully hacked three times

US Nuclear Regulatory Commission successfully hacked three times

The US Nuclear Regulatory Commission (NRC), which houses detailed classified records about nuclear reactors, radioactive material storage and uranium processing plants, has been hacked three times over the past three years, according to a new report.

PRODUCT REVIEWS

Kaspersky Endpoint Security for Business

starstarstarstarstar
Kaspersky Endpoint Security for Business is an enterprise-grade endpoint security system that addresses malware, mobile device management, endpoint controls, encryption and systems management.

Dell KACE K1000 Systems Management Appliance v6.0

starstarstarstarstar
Addresses systems management tasks: device discovery and inventory, software distribution, patch management, software asset management (SAM), security audit and enforcement, service desk, power management and more.

Novell ZENworks Endpoint Security Management v11

starstarstarstarstar
Novell ZENworks Endpoint Security Management v11 hits all of the marks for a full-featured endpoint security product by addressing managing.

Virtual Events

Opinions

All your vulnerabilities belong to us: The rise of the exploit

All your vulnerabilities belong to us: The rise of the exploit

The growing impact of web exploits isn't just limited to the enterprise market and must be countered on an industry-scale, says Pedro Bustamante.

Is your organisation ready for the next generation of millennials?

Is your organisation ready for the next generation of millennials?

A different attitude to privacy and security among many new workplace entrants is a potential risk that has to be managed says Chris Sullivan.

Why we need a tighter framework for social engineering penetration testing

Why we need a tighter framework for social engineering penetration testing

Protect against real-world threats and test the most likely scenarios using relevant models, including low-tech, says Gavin Watson.

Director's Cut

Sign up to our newsletters