This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

FEATURED

Internet of Things creates new set of security headaches

Internet of Things creates new set of security headaches

New research claims to show that the Internet of Things (IOT) is riddled with potential security inconsistencies, which make the IP interconnection of electrical devices - a key feature of the IoT - extraordinarily difficult to secure in practice.

MORE NEWS

Hackers tap flaws in Amazon cloud to host DDoS botnets

Hackers tap flaws in Amazon cloud to host DDoS botnets

Profitable and easy-to-use vulnerability exploited by cybercriminals says security researcher

China allegedly behind attack on Canadian research group

China allegedly behind attack on Canadian research group

One day on from claims that Chinese hacker group 'Comment Crew' was behind the theft of confidential documents on an Israeli missile defense system, the country is also being cited for more recent attacks against a Canadian government research organisation.

UK Lords slams EU ruling on "right to be forgotten"

UK Lords slams EU ruling on "right to be forgotten"

A committee sitting in the UK's House of Lords has said that the EU's ruling on the 'right to be forgotten', which requires companies to delete data on request where appropriate, is 'unworkable'.

PRODUCT REVIEWS

MobileEther v2.0 by iboss

starstarstarstarstar
With employees mixing personal and business applications on their mobile devices, parameters for security must be imposed. This product is also considered very good value for money.

BlackBerry Enterprise Service 10 BES10

starstarstarstarstar
With employees mixing personal and business applications on their mobile devices, parameters for security must be imposed. The product-set offers value for money.

Mobile Enterprise Compliance and Security Server MECS v1.9.4.2 by M.A.D. Partners

starstarstarstarstar
With employees mixing personal and business applications on their mobile devices, parameters for security must be imposed. We find this product is very good value for money.

Virtual Events

Opinions

Real threats start with humans, not technology

Real threats start with humans, not technology

When the two IPs meet (intellectual property and internet protocol) the value of the business becomes vulnerable says Dave King, with IT often just providing a sticking plaster to hide C-suite ignorance.

Securing the energy industry: is success a dead CERT?

Securing the energy industry: is success a dead CERT?

Industry needs a brighter collaborative approach to help bring it out of the dark ages says Alan Carter

The science behind DDoS extortion

The science behind DDoS extortion

Don't capitulate, have a plan in place, and of course, prevention is better than cure when it comes to tackling the prospect of DDoS ransom attacks says Dan Holden.

Director's Cut

Sign up to our newsletters