June 9, 2017

Lenovo launches 2017 range of Think PCs

Lenovo has announced the India launch of its 2017 range of ThinkPads, ThinkCentres and TIOs powered by 7th Generation Intel Core i7 Processors. The 2017 range […]
February 12, 2017

Security Think Tank: Integrity attacks tough, but not impossible to spot

What type of organisations is likely to be targeted by data integrity breaches and how best can they detect and mitigate against such attacks?… ComputerWeekly: Latest […]
February 12, 2017

Security Think Tank: Data integrity breaches – the challenge facing banks

What type of organisation is likely to be targeted by data integrity breaches and how best can they detect and mitigate such attacks?… ComputerWeekly: Latest IT […]
January 15, 2017

Security Think Tank: Use DNS proxy services to bolster security

What are the main security risks associated with DNS, and how are these best mitigated?… ComputerWeekly: Latest IT News
January 11, 2017

Security Think Tank: Business should arm against rise in DNS server attacks

What are the main security risks associated with DNS and how are these best mitigated?… ComputerWeekly: Latest IT News
December 2, 2016

Security Think Tank: Cyber security must be recognised as a fundamental component of business

How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses?… ComputerWeekly: Latest IT News
November 13, 2016

Security Think Tank: Six key factors in cyber insurance

What should organisations consider if they are to prepare for cyber insurance? … ComputerWeekly: Latest IT News
September 5, 2016

Security Think Tank: Malware infection is inevitable, so be prepared

How can businesses best prepare their cyber defences in light of the fact that attackers are increasingly using malware designed to evade detection and analysis? ComputerWeekly: […]
September 2, 2016

Security Think Tank: Addressing the malware arms race

How can businesses best prepare their cyber defences in light of the fact that attackers are increasingly using malware designed to evade detection and analysis? ComputerWeekly: […]