Computer Security,Internet security, Security Architecture, Web filtering, IT Protection

IT Reseller news and articles relating to Computer Security, Internet security, Web filtering, Virus protection, Firewall, Encryption, Network Security, Anti-Virus Software, Security Architecture, Platform Security, Computer Viruses, Spyware, Phishing & Spam protection,

RSS

Endpoints most vulnerable aspect of industrial IoT as SANS survey reveals confusion over industrial IoT security

Endpoints most vulnerable aspect of industrial IoT as SANS survey reveals confusion over industrial IoT security

Organisations hold disparate and unrealistic views on protecting the Industrial Internet of Things (IIoT), in which endpoints are considered to be the most vulnerable aspects, despite confusion over what actually constitutes an endpoint.

Security for intent-based networking

Security for intent-based networking

By Ronald Sens, EMEA Director, A10 Networks

Networks have become more massive and complex than ever before. This year at Cisco Live US, people were talking about managing and defending networks at scale.

Retailers must beat off hackers to safeguard their businesses

Retailers must beat off hackers to safeguard their businesses

Retailers who install Wi-Fi networks to connect in-store POS and staff devices, as well as provide free Wi-Fi to customers, are increasingly vulnerable to cyberattacks that could impact their businesses, says Vodat International, the network security provider to the retail industry.

Stronger and more frequent brute force attacks are now the norm

Stronger and more frequent brute force attacks are now the norm

The number and intensity of brute force attacks – such as those which targeted the UK and Scottish Parliaments last year – has increased dramatically over the first half of this year, according to new research from leading cyber security specialist Foregenix.

EACS continues its expansion with acquisition of disaster recovery, IT and managed services specialists, Sentronex

EACS continues its expansion with acquisition of disaster recovery, IT and managed services specialists, Sentronex

Managed services provider EACS has acquired the privately held IT services company Sentronex.

SolarWinds MSP enhances risk intelligence with expanded data breach risk scan

SolarWinds MSP enhances risk intelligence with expanded data breach risk scan

SolarWinds MSP has enhanced its SolarWinds Risk Intelligence offering with an Expanded Data Breach Risk Scan (ExDBRS), helping users better discover and identify risks from security vulnerabilities stored on endpoint devices, and enhancing regulatory compliance capabilities.

Hollis Technology joins Dell EMC Select Partner Programme

Hollis Technology joins Dell EMC Select Partner Programme

Hollis Technology, the UK provider of business support solutions, has signed a definitive reseller agreement with Dell EMC establishing the company as an Authorised Solution Provider within Dell EMC's Select Partner Programme.

FICO survey: UK firms are too confident about their cybersecurity

FICO survey: UK firms are too confident about their cybersecurity

Despite the growth in data breaches, senior executives at UK firms think their cybersecurity protection is top-notch, according to a new survey conducted by research and consultancy firm Ovum for Silicon Valley analytics firm FICO.

When the path to destruction has a happy ending…

When the path to destruction has a happy ending…

By David Fathers, Regional General Manager at Crown Records Management.

Weak passwords are behind the success of cyber crimes

Weak passwords are behind the success of cyber crimes

Ahead of the findings published by the City of London Police which reveals that cyber crime victims lost £28m between October 2017 and March 2018, Martin Tyley, cyber security lead at KPMG in the UK, highlights passwords are key to the success of these cyber crimes.

Editorial: +44 (0)1892 536363
Publisher: +44 (0)208 440 0372
Subscribe FREE to the weekly E-newsletter