CEO Chen Sets TrendMicro’s Sights on IoT Security
Eva Chen, the CEO of TrendMicro, discusses her plans for tackling the next generation of IT challenges. Eva Chen has spent most of her professional career building security vendor TrendMicro, which...
View Article75% of Europe’s workforce will be mobile by 2018, IDC research reveals
New whitepaper sponsored by OKI Europe outlines impact of BYOD and growing mobile workforce, creating a critical need for secure ‘anytime and anywhere’ access Egham, 26 January 2016 – Three quarters of...
View ArticleZylpha Adds Integration To SharePoint, iManage, Civica And NetDocs
Legal systems innovator Zylpha (www.zylpha.com) has added four new software integrations with systems that are frequently used by both legal practices and local authority lawyers. The new integrations,...
View ArticleAdaptiveMobile expands product portfolio to secure multi-million user base on...
New RESTful API enables the Company to bring carrier-grade security to messaging applications worldwide DUBLIN AND DALLAS, January 26th, 2016 – AdaptiveMobile, the world leader in mobile network...
View ArticleFirefox 44 Debuts With Improved Security
Mozilla adds push notification support and provides 11 security advisories with its latest open-source browser release. Mozilla came out today with its first Firefox browser release for 2016,...
View ArticleSafeBreach Simulates Attacks on Customers to Find Security Risks
Attackers use multiples types of tools and techniques to exploit an organization that SafeBreach automates in an effort to determine risk. One way to know if a company is vulnerable to attacks is to...
View ArticleWhy Your Enterprise Must Pay Close Attention to IoT Device Security
NEWS ANALYSIS: It's apparent now that Internet of Things security is laughably bad, but you can prevent your enterprise from being the butt of the joke. The woman on the videoconference screen looked...
View ArticleInternet of Things Security Problem Just Keeps Gettin Bigger
Recent reports about Webcams being readily accessible to anyone using an Internet port-scanning service shows why there has been little progress in securing connected devices as we move into 2016 Every...
View ArticleADLV Predicts Broader Use of Electronic Driver Checks in 2016 As Fleets...
The ADLV (Association for Driving Licence Verification) www.adlv.co.uk is forecasting that best practice and road safety objectives will drive a greater fleet focus on the volume, frequency and type of...
View ArticleDatum Cloud Connect offers data centre clients direct connectivity to leading...
FARNBOROUGH – 27 January 2016 – Datum Datacentres today announced the launch of Datum Cloud Connect to provide direct connectivity from its Farnborough data centre to major public clouds such as AWS...
View ArticleTotal IT shut down at Lincolnshire County Council over zero-day attack
Adult care details, as well as staff bank details, accessed in attack attributed to malware
View ArticleLockr Managed Key Service for Drupal, WordPress Launches
Lockr, a hosted API and managed key service for Drupal is out of beta and now also available for WordPress. Cellar Door Media announced that Lockr, a key management service for modern content...
View ArticleNew Complete Cloud-Based Security Solution from iSheriff
iSheriff Complete replaces point products for Web, email and endpoint security27 January 2016 – iSheriff, a leading cloud security company, today announced the release of iSheriff Complete, a...
View ArticleLANDESK Modernizes IT through Automated Unified Endpoint Management and...
Upgrades to Core Offerings Give Users Streamlined Workspaces, Automated Rollout Projects and Secure Mobile EmailBRACKNELL — January 27, 2016 — Furthering its vision to modernize IT, LANDESK today...
View ArticleOrganizations Still Paying Breach Costs After Remediation
A new report from SANS Institute examines the costs that organizations deal with after they clean up from a breach. Data breaches often result in myriad costs for victimized organizations and...
View ArticleWendy’s Investigates Possible Data Breach
The Wendy's Company fast-food chain is now trying to determine if some of its locations were affected by payment card fraud. The Wendy's Company might be the latest household name-brand company to be...
View ArticleAttacks on Ukrainian Power Providers Hold Lessons for the Future
NEWS ANALYSIS: The first known cyber-attack to cause a power outage shows that power companies will no longer escape damaging attacks. On Dec. 23, a blackout hit the western part of Ukraine, affecting...
View ArticleLicense Plate Scanning System Turns Police Into Debt Collectors
NEWS ANALYSIS: Texas police cars now use license plate scanners to hunt for court-fine deadbeats and they can take payment on the spot–with the vehicle data collected and held by a private company....
View ArticleLegal Landscape Report Reviews The Issues Affecting The UK’s Legal IT
Legal systems innovator Zylpha (www.zylpha.com) and Converge TS (www.convergets.co.uk), the UK’s only dedicated Cloud computing provider for law firms, have launched a joint report on the issues...
View ArticleFirefox 44 Debuts With Improved Security
Mozilla adds push notification support and provides 11 security advisories with its latest open-source browser release. Mozilla came out today with its first Firefox browser release for 2016,...
View Article