Cyber security top concern for corporate IoT deployments: BlackBerry

Cyber security is the top concern regarding digital technologies and processes for firms globally (63 per cent) but only a few (37 per cent) actually have a formal digital transformation strategy in place when it comes to Internet of Things (IoT) deployments, new research said on Tuesday. Read about the new research by BlackBerry which […]

Protect Your Company from a Debilitating Data Breach

The U.S. National Cyber Security Alliance found that 60% of small companies are unable to sustain their businesses over six months after a cyberattack. In addition, according to the Ponemon Institute, the average price for small businesses to clean up after their organizations have been hacked stands at $690,000; and for middle market companies, it’s […]

The top five security threats to your business

Cyber security breaches are more common now than they have ever been. The Level 3® threat intelligence team has identified the top five most common security threats that you should know about. Read the whitepaper on top five security threats to your businesses from Level 3 on Information Management.

Securing workspaces in a hyperconnected digital era

Enterprises that fail to offer employees a flexible, autonomous, and creative work environment are at risk of not attracting and retaining next-generation talent, according to Dimension Data. Unfortunately, most workspaces are not ready for the cyber threats of tomorrow. Read about the new White Paper published by Dimension Data which states that most workspaces are […]

Mobile Workspaces Are Not Ready for the Cyber Threats of Tomorrow

Dimension Data, the USD7.5 billion global ICT solutions and services provider, today published a ¹white paper that examines the need for organisations to transform in order to allow employees to work in more mobile workspaces. In fact, enterprises that fail to offer employees a flexible, autonomous, and creative work environment are at risk of not […]

Tech Refresh for the Forensic Analysis Toolkit

The most widely used commercial forensic tools have not undergone major architectural change since their market introduction in the late 1990s. Meanwhile, architectural change elsewhere has brought fast, powerful and inexpensive search, data visualization, and collaboration capabilities to users of all ages and computing experience levels. Read about the forensic analysis toolkit on SANS Institute.

How to stop critical digital infrastructure being at risk of cyber attack

Data centres are part of the critical infrastructure for the global economy. Yet they are open to attack because of software vulnerabilities in the industrial control systems which manage these facilities. Read the whitepaper analysis about critical national digital infrastructure on Computer Business Review.