DDoS as an attack vector is on the rise: here's how to stop it from stopping your business

With the cyber threat landscape evolving rapidly, Information Age asks: is 2016 the year businesses and security firms finally turn the...

The formal adoption of the European General Data Protection could be a boost for cloud computing - here's how

A three-pronged defence – detect, prevent and respond, is the foundation of a good cyber security practice

With TalkTalk's annoucement that the cost of their cyber-security breach has more than doubled to £80 million, the business case for decisive...

Applications and workflows are built in a way that means an employee has to go through complex systems- a problem that can be solved through task-...

The common thread running through the major breaches of 2015 is that all of them had their privileged access rights compromised. And yet how many...

Large companies are spending more on mobile management and face whopping unexpected charges and security cleanup bills, study warns 

As a global community we are at the beginning of a difficult journey, with various threats posing a real danger to the established world economic...

Unified communications (UC) saw widespread deployment in 2015, but will 2016 be a watershed year in achieving value and ROI through adoption?

Pages