A new study has found a growing 'visibility void' around encryption that is a potential threat to enterprises

For many victims of successful hacks, the question is ‘why us?’ To answer this and better understand how to protect ourselves against threats to...

New authentication device combines multi-factor authentication of card and pin with unique palm-vein...

Users or lines of business go outside of their organisation’s IT group to meet their cloud needs, causing a huge headache for security that isn't...

Those using analytics to secure their organisations' perimeter might have a surprising amount to learn from the principles of music 

Looking back over the major breaches of the past few months, it's clear that a shift in focus from prevention to detection is needed for...

Shellshock is the scariest threat to BYOD yet – but for organisations that still insist BYOD is right for business, there are solutions available...

As the endless balancing act between mobility and security continues, companies have to guard their data like the UK's most wanted

People have accepted far too easily an empty premise that they must increasingly sacrifice their privacy to enjoy life in a technology-driven...

Pages