Topic: Security

Interop ITX to focus on current and future state of IT in the workplace

Interop ITX to focus on current and future state of IT in the workplace
By Rebecca Gibson | 26 April 2017

Cloud, big data and DevOps will also be covered at the event in Las Vegas this May

Security of Things World 2017

Security of Things World 2017
By Rebecca Gibson | 24 April 2017

12-13 June, Titanic Chaussee Hotel Berlin, Germany

Key topics will include security in the cloud, data privacy and much more

Lloyds Banking Group is first in its industry to trial Windows Hello

Lloyds Banking Group is first in its industry to trial Windows Hello
By Lindsay James | 21 April 2017

Customers of Lloyds Bank, Halifax and Bank of Scotland will benefit from new biometric functionality

Microsoft’s president calls for greater security and privacy in the digital world

Microsoft’s president calls for greater security and privacy in the digital world
By Lindsay James | 30 March 2017

Brad Smith says companies like Microsoft are on the front lines to help fight against nation state attacks

Worldwide IT security spending to hit US$90 billion in 2017

Worldwide IT security spending to hit US$90 billion in 2017
By Rebecca Gibson | 22 March 2017

Gartner predicts firms will improve their cyber threat detection and response capabilities

The growing need to secure desktop applications

The growing need to secure desktop applications
By Guest | 22 March 2017

Bogdan Mitrache from Caphyon outlines how containerised applications like App-V and AppX, with built-in support in the latest Windows 10 edition, can provide piece of mind for IT departments

Bogdan Mitrache from Caphyon outlines how containerised applications can provide piece of mind

Netwrix webinar

Netwrix webinar
By Rebecca Lambert | 20 March 2017

Join to hear about the top 10 critical incidents in your Windows-based IT infrastructure

How organisations in Asia Pacific can safeguard against cyberattacks

How organisations in Asia Pacific can safeguard against cyberattacks
By Guest | 20 March 2017

Keshav Dhakad from Microsoft Asia’s Digital Crimes Unit outlines what makes a robust cybersecurity strategy

Keshav Dhakad from Microsoft Asia’s Digital Crimes Unit offers tips for a robust cybersecurity strategy 

Why Interop ITX is going full stack for 2017

Why Interop ITX is going full stack for 2017
By Guest | 07 March 2017

Emily Johnson, digital content editor at InformationWeek, gives an overview of the key IT topics that will be explored at Interop ITX this May

An overview of the key IT topics that will be explored at Interop ITX this May

Companies are missing the human touch in their cybersecurity efforts

Companies are missing the human touch in their cybersecurity efforts
By Lindsay James | 02 March 2017

Willis Towers Watson research shows that people are responsible for two-thirds (66%) of cyber breaches

The growing need for security intelligence

The growing need for security intelligence
By Guest | 20 February 2017

The findings of Kaspersky Lab’s recent Corporate IT Security Risks report not only put cybersecurity threats in a new perspective, they also reveal a serious problem and its possible solution. Mikhail Nagorny explains

Mikhail Nagorny outlines the findings of Kaspersky Lab’s recent report on cybersecurity threats

Interop ITX

Interop ITX
By Rebecca Gibson | 15 February 2017

15-19 May; MGM Grand, Las Vegas, Nevada, US

The independent conference delivers full stack IT education for technology leaders

Five questions executives should be asking their security teams

Five questions executives should be asking their security teams
By Lindsay James | 06 February 2017

A new e-book from Microsoft provides a cybersecurity checklist to help enterprises reduce risk  

Cybersecurity must take centre stage in 2017, warns UK expert

Cybersecurity must take centre stage in 2017, warns UK expert
By Lindsay James | 25 January 2017

Stuart Aston, Microsoft’s UK national security officer, outlines his predictions for the year ahead

Social engineering: learn from the mistakes of Troy

Social engineering: learn from the mistakes of Troy
By Guest | 23 January 2017

Alun Rogers from risual argues that too many organisations leave the door to their data wide open

Microsoft’s Cyber Defense Operations Center shares best practices

Microsoft’s Cyber Defense Operations Center shares best practices
By Rebecca Gibson | 20 January 2017

Microsoft aims to help enterprises protect against, detect and respond to cyber threats in real time

IoT will be the single biggest security threat this year

IoT will be the single biggest security threat this year
By Lindsay James | 09 January 2017

The rise of DDoS attacks and botnets present security concerns around IoT, according to IDC

A third of cyberattacks lead to security breaches, says Accenture

 A third of cyberattacks lead to security breaches, says Accenture
By Rebecca Gibson | 07 November 2016

New survey finds average company experiences up to three effective attacks per month

Simplifying the evolution of smart tech at Innodep

Simplifying the evolution of smart tech at Innodep
By Lindsay James | 07 November 2016

Innodep in South Korea has cut development time by 40% for its internet of things security management solution

Innodep in South Korea has cut development time by 40% for its IoT security management solution

How the cloud can improve government data centre security

How the cloud can improve government data centre security
By Lindsay James | 31 October 2016

Three reasons why the Microsoft cloud makes government data centres more secure

 

The need for improved cybersecurity in higher education

The need for improved cybersecurity in higher education
By Guest | 28 October 2016

Florian Malecki from Dell Security says that higher education IT professionals face an enormous task when it comes to enabling end users to maximise the benefits of increased mobility and connectivity, while keeping the institution’s network and data secure

Florian Malecki from Dell Security explains how to keep an institution’s network and data secure

Cloud-ready security and enterprise performance

Cloud-ready security and enterprise performance
By Guest | 20 October 2016

Many organisations move applications to the cloud for reasons such as improved efficiency and access. What many do not realise is that modernising security can have the same effect, says Klaus Gheri at Barracuda Networks

Modernising security can improve efficiency and access, says Klaus Gheri at Barracuda Networks

Advanced cyber threats: what to consider

Advanced cyber threats: what to consider
By Guest | 07 October 2016

Kirill Kertsenbaum from Kaspersky Lab says that cyberattacks are not only increasing in number, but they’re becoming far more sophisticated too. Securing your business against these attacks requires the right combination of intelligence and technology

Kirill Kertsenbaum from Kaspersky Lab outlines strategies for securing your business against attacks

Microsoft advances its cybersecurity investments in Asia-Pacific

Microsoft advances its cybersecurity investments in Asia-Pacific
By Lindsay James | 05 October 2016

Microsoft has launched its first combined Transparency Center and Cybersecurity Center in Singapore

Creating a safer world in which to do business

Creating a safer world in which to do business
By Lindsay James | 29 September 2016

Cybercrime is an increasing concern for businesses the world over. Ann Johnson, Vice President of Microsoft’s Enterprise Cybersecurity Group, is joined by a number of key partners to explain what is being done to tackle the threats and create peace of mind

Microsoft's Ann Johnson explains what is being done to tackle threats and create peace of mind

Fintech innovation and cybersecurity top the bill at Sibos

Fintech innovation and cybersecurity top the bill at Sibos
By Rebecca Lambert | 27 September 2016

Finserv leaders gather in Geneva to discuss the top technology trends impacting the industry

Helping retailers to become seamless and secure

Helping retailers to become seamless and secure
By Guest | 27 September 2016

This is the second in a series of articles by Microsoft’s Vic Miles that explores the need to innovate around the friction points of achieving retail goals. Here he looks at the metrics related to consumer engagement across channels

Microsoft’s Vic Miles looks at the metrics related to consumer engagement across channels

Protecting government agencies from cyberattacks

Protecting government agencies from cyberattacks
By Guest | 16 September 2016

A cybersecurity attack on a government agency can put the personal data of citizens and employees at risk and potentially have wider security and safety repercussions, says Microsoft’s Paul Hart

Microsoft’s Paul Hart says a cyberattack on a government agency can have huge repercussions

Meeting the challenges of the mobile revolution

Meeting the challenges of the mobile revolution
By Guest | 07 September 2016

The mobile revolution has been both blessing and curse for organisations. While it has enabled workers to be more productive away from the office, it has also introduced a whole host of new security threats. Florian Malecki from Dell Security explains further

Florian Malecki from Dell Security says the mobile revolution has introduced a host of security threats

Finding the truth in a non-stop avalanche of data

Finding the truth in a non-stop avalanche of data
By Guest | 24 August 2016

With data offering the potential to make significant enhancements to the business, the importance of ensuring it is reliable and trustworthy is paramount. Profisee’s Jeff Wilson explains

The importance of ensuring data is trustworthy is paramount. Profisee’s Jeff Wilson explains

Protecting customer data at the point of sale

Protecting customer data at the point of sale
By Rebecca Gibson | 24 August 2016

We speak to Microsoft’s Pinar Salk to understand how innovations in point-to-point encryption are helping retailers and merchants to provide a more secure POS experience for their customers

Microsoft’s Pinar Salk tells us how innovation in point-to-point encryption is helping retailers

Ransomware: making sure you're aware of the threat

Ransomware: making sure you're aware of the threat
By Guest | 24 August 2016

Nick Smith from Extrinsica Global explains how to prevent a ransomware attack

Simon Smith from Extrinsica Global explains how companies can prevent a ransomware attack