This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

FEATURED

LATEST NEWS

Home Depot card data breach undetected for four months

Home Depot card data breach undetected for four months

The Home Depot card data breach may have continued for longer than the Target attack late last year, according to new reports.

Microsoft closes Trustworthy Computing as part of layoff strategy

Microsoft closes Trustworthy Computing as part of layoff strategy

In a surprise move, Microsoft has effectively closed its Trustworthy Computing (TwC) Group as part of the loss of 2,100 jobs in a restructuring plan announced late last week.

New Androids will encrypt your data just like iPhones

New Androids will encrypt your data just like iPhones

Google has promised that the next generation of Android phones will automatically encrypt data - preventing police and other agencies snooping on their users.

NEWS BYTES

Jihadists didn't increase security due to NSA leaks

Average intrusion prevention product 94% effective

Lessons learned from China's cyberattacks

PRODUCT REVIEWS

WatchGuard XCS 580 v10.0

starstarstarstarstar
The WatchGuard XCS 580 (Extensible Content Security Appliance) is an easy-to-use, all-inclusive email and web appliance that provides security and privacy of inbound and outbound traffic.

SafeT Data SafeT Box v5.1

starstarstarstar½
Safe-T Box is a secure email and data exchange solution comprised of three components offering high levels of security for secure email solutions.

EdgeWave ePrism Email Security v9.7

starstarstarstar½
EdgeWave ePrism offers a complete suite of email security services.

Virtual Events

Opinions

The (grim) reality of password security

The (grim) reality of password security

There are security vulnerabilities when using passwords, but Tyler Moffitt says that there are steps that you can and should take to make sure your data less easy to access.

The new rise of biometrics

The new rise of biometrics

Biometric id options need appropriate mobile computing support to ensure that they too are not compromised says Jon Geater.

Cyber risk management: A boardroom issue

Cyber risk management: A boardroom issue

Having comprehensive cyber risk policies that are not followed can be as detrimental as not having a policy at all says Peter Given.Good who advises that good risk-insurance will demand appropriate procedures are both in place and implemented.

Director's Cut

Sign up to our newsletters