News

ATT security.jpg

AT&T joins global cyber security alliance formed by Etisalat, Singtel, SoftBank and Telefónica

Alliance combines resources and capabilities of telecom operators to help protect all types of businesses from the growing threat of sophisticated cyber-attacks. With the inclusion of AT&T, the Alliance greatly increases its global presence

more
mike hamilton.jpg

Ziften expands Board of Directors with appointment of California investment executive and entrepreneur Dave Lin

Investment executives/entrepreneurs Patrick O’Reilly and Jonathan Hung join Ziften as Board Observers more
Vera Jourova CE.jpg

International data flows: The European Commission launches the adoption of its adequacy decision on Japan

Following the conclusion of the EU-Japan talks on personal data protection in July 2018, the Commission yesterday launched the procedure for the adoption of its adequacy decision. The EU and Japan affirm that, in the digital era, promoting high privacy and personal data protection standards and facilitating international trade must and can go hand in hand

more
more news

Products

Hotshot Aaron Turner.JPG

i.s.c. Group selects Hotshot Technologies to mitigate security risk and enhance global collaboration efficiency and security

Hotshot selected by ISO 27001/ISMS and GDPR experts to easily meet demands of industry regulations, privacy and labor laws in the age of mobile-first communication
more
Versa Atchison Frazer.JPG

Versa Networks partners with Nuvias to offer secure cloud IP software solutions across Europe

Versa Networks, innovator of the Secure Cloud IP Platform, has chosen EMEA VAD Nuvias to bring its software-defined branch and software-defined security solution for wide-area networks (WANs) across EMEA more
nCipher Peter Galvin.JPG

nCipher Security enables organizations to keep pace with expanding cloud and IoT security requirements

Improved configuration, scalability and availability of nShield Connect XC benefits cloud, IoT and blockchain HSM deployments more
more products

Interviews

Japan MWC 2013.JPG

Questions & answers on the Japan adequacy decision

What is an adequacy decision? An adequacy decision is a decision taken by the European Commission establishing that a third country provides a comparable level of protection of personal data to that in the European Union, through its domestic law or its international commitments
more
Cybersecurity Europe.JPG

Directive on Security of Network and Information systems, the first EU-wide legislation on cybersecurity

9 May was the deadline for the Member States to transpose into national laws the Directive on Security of Network and Information Systems (NIS Directive) that entered into force in August 2016. The NIS Directive is the first EU-wide legislation on cybersecurity

more
Brian Lord OBE.JPG

The Mind of the Hacker - Insights from GCHQ, MI6 and Israeli Intelligence

It used to be the trickery of the disinterested joker – bright youngsters pulling the data strings just to see what would happen. Then came criminals, adapting old con-trickery and thieving skills to the new cyber environment. Then it escalated to international gangs and now we are faced with political interest and rival shaping a post-truth world. Where are we heading? What is already happening? Vital questions must be addressed in this opening session before we turn to the technologies, solutions and strategies for securing the Cloud and Internet of Things. Brian Lord, OBE – former GCHQ Deputy Director for Intelligence and Cyber Operations – begins by describing the big picture, how it is evolving and where we could be heading. How is the balance of knowledge and power changing? And how will this affect our industry, business and society?

more
more interviews

Articles

Debate III Rik Turner Ovum.JPG

Who is responsible for cloud security?

It must be a sign of the times. The world is growing so weary of all those malware massacres in the Internet Wild West, that security is beginning to feel quite sexy. The recent NetEvents EMEA Press Spotlight discussion – Enterprise Security Considerations for the Cloud – Containers, Perimeters, and Access Controls– added greater intelligence to the mix

more
Debate III Peter Galvin nCipher.JPG

nCipher survey reveals americans trust banks most with their personal data

But about half said a cyberattack or lack of a hack notification would erode that trust more
Raj Samani.JPG

New IoT vulnerabilities illustrate risks of connected devices

McAfee encourages consumers and businesses to take action to secure Internet of Things more
more articles