In the News

In the News

The six stages of a cyber attack lifecycle

In response to the shortcomings of prevention-centric security strategies, and the challenges of securing an increasingly complex IT environment, organizations…

Read More

Study user behavior to focus intrusion detection

Organizations have long sought to reduce their data breach detection time and increase their ability to mitigate breaches more quickly…

Read More

Global cybercrime prosecution a patchwork of alliances

One of the biggest issues is that unlike traditional bank robbers, who used to try to escape by driving their getaway cars across the state lines, modern cyber-crooks hide overseas…

Read More

How security approaches are evolving in Southeast Asia and beyond

Bill Smith, senior vice-president of worldwide field operations at LogRhythm, talks to Computer Weekly about the big shift in cyber security…

Read More

20 ways to attract good luck

Check out these quotes from a pile of executives who share their views on how anyone can be luckier…

Read More

UK firms struggling to manage cyber threats, survey shows

UK businesses are struggling to detect, prevent and respond to cyber threats, a survey of 2,000 IT professionals from companies of various sizes across 14 industry sectors has revealed…

Read More

See what we've been working on...

See how we're delivering on promises to better serve our customers