A two-step authentication system is one of the best ways to secure apps and data- but first organisations have to know how to apply it properly...

Giving cloud end-users the flexibility to apply their own encryption solves many of the problems around privacy, but there are lots of factors for...

Yes, you read correctly: a bit of hacking can actually be good for your business

Investing in new hardware isolation methods like micro-virtualisation is an easy decision when you factor in the ROI and the additional benefits...

By analysing a malware called BlackWorm, security firm FireEye was able to identify 11 members of the group and the group itself

Don’t acquire more than you bargained for

The UK government needs to take a coordinated approach with the business world on the issues of education and skills in cyber security 

Threat intelligence is not the panacea for safeguarding networks, but enterprises should at least aim to get the basics down

Every wearable device gives hackers a potential new way into sensitive company, employee or customer data