Security search results

Your search for Security returned 316 result(s).

Vectra AI research shows 71% of organisations may have been breached and not know about it

1 Vectra AI research shows 71% of organisations may have been breached and not know about it

Vectra AI, the developer of AI-driven cyber threat detection and response for hybrid and multi-cloud enterprises, has released a new research report identifying that 97% of analysts are worried they will miss security events, with 71% admitting their organisation may have been compromised and they don’t know about it yet.

The rise of OT cybersecurity threats

2 The rise of OT cybersecurity threats

Until recently, cyberattacks focused primarily on electronic data such as login credentials, credit card information, and other types of both personal and business information.

A look at new in the NIS2 Directive

3 A look at new in the NIS2 Directive

By Bernard Montel, Cybersecurity Strategist and Technical Director, Tenable.

The Directive on the security of Network and Information Systems, often shortened to NIS, was first established in July 2016. When introduced it encompassed two groups— the operators of essential services; and relevant digital service providers, with the aim to strengthen cybersecurity resilience.

Fujitsu selects Alluvio Aternity by Riverbed for Fujitsu Intelligent Automation Platform

4 Fujitsu selects Alluvio Aternity by Riverbed for Fujitsu Intelligent Automation Platform

Riverbed has announced that Fujitsu, the global IT service provider, selected Alluvio Aternity, as a key technology for its Intelligent Automation Platform (IAP). IAP is a Fujitsu initiative to deliver a core automation engine underpinning Fujitsu’s offerings such as End User Services, Service Desk and Enterprise Cyber Security.

Manufacturing & Logistics IT Magazine - June 2023 Issue

5 Manufacturing & Logistics IT Magazine - June 2023 Issue

In this issue we feature a Special Technology Report looking in depth at the latest developments in the world of Enterprise Resource Planning (ERP) and related technology.

Also included is a ‘Cover Story’: Trust and security – The essential ingredients for the future of generative AI. Here, Gartner discusses what data and analytics leaders responsible for AI development need to know about AI trust, risk and security management.

Intelligent video systems: Transforming manufacturing while safeguarding privacy

6 Intelligent video systems: Transforming manufacturing while safeguarding privacy

By Simon Randall, data privacy and security expert and CEO at Pimloc, the AI-powered video privacy and security company.

Intelligent video systems have the potential to transform manufacturing processes, enhance security measures, and improve employee safety.

Canon enhances workspace print offering with security and sustainability benefits

7 Canon enhances workspace print offering with security and sustainability benefits

Canon UK has announced a refresh to its award-winning range of imageRUNNER and imageRUNNER ADVANCE DX multifunction and single function devices. Through this expanded offering, Canon Europe can support partners in strengthening and diversifying their product portfolios for customers.....

More than half of UK businesses impacted by supply chain cyber breaches

8 More than half of UK businesses impacted by supply chain cyber breaches

More than half (57%) of UK businesses have been impacted because of a cyber security/information security incident caused by a third-party vendor or supply chain partner, according to new research published by ISMS.online.

As the National Cyber Security Centre provides supply chain mapping advice companies have to ensure that they don’t rely just on ‘trust’

9 As the National Cyber Security Centre provides supply chain mapping advice companies have to ensure that they don’t rely just on ‘trust’

In an ongoing effort to help companies understand and shut the vulnerabilities that lie within their supply chains, the National Cyber Security Centre (NCSC) has issued its latest advice.

New survey of 2500+ suppliers reveals key supply chain cyber security weaknesses

10 New survey of 2500+ suppliers reveals key supply chain cyber security weaknesses

Attackers are targeting under-resourced suppliers with weaker defences as a way of disrupting or compromising larger organisations.

Editorial: +44 (0)1892 536363
Publisher: +44 (0)208 440 0372
Subscribe FREE to the weekly E-newsletter