spacer
spacer
spacer
spacer

spacer
Most Read
  • Comment: What will 2013 bring for cyber security? 30.01.13
  • Middle East Tackles Cyber Security Threat With World Class Training 30.01.13
  • IT security trends in 2013: Cyber war not on the horizon 30.01.13

Latest blog posts
  • 11.01.12 Tackling Application Security
  • 20.09.11 Cybercrime: Dont become the next headline
  • 28.08.11 Mobile Malware Part IV
  • 24.08.11 Mobile Malware Part III
  • 23.08.11 Mobile Malware Part II
  • 22.08.11 Ring Ring: Mobile Malware calling

Useful Links
  • Business news and analysis for Small to Medium Enterprises
    The SME
  • News for the e-commerce professional
    The E-Commerce Pro
  • News for the m-commerce professional
    The M-Commerce Pro
  • News for the s-commerce professional
    The S-Commerce Pro
  • News from Ecommerce Week
    Ecommerce Week
  • Retail Technology for the multichannel age
    Retail Technology

spacer

First, the good news - we think security will improve for larger, well-funded organizations. By Amichai Shulman, Imperva CTO and Co-founder

spacer

G Data expects significantly more targeted attacks as well as Mac and Android malware

spacer

There has been an unprecedented volume of malicious code and attacks - including many high profile incidents - in the Middle East during 2012.

spacer

The GSMA (the global trade association of mobile operators) believes that mobile can energise the high street by creating a link between the online world and the bricks and mortar retail environment. By Paul Crutchley Market Development Director GSMA and Marina Solin - Publi...

spacer

Alan Stephenson-Brown, UK Managing Director for Phoenix Managed Networks believes that a multi layered approach to security is required across the board to improve current practices.

spacer

Lamar Bailey, Director of Security Research and Development with nCircle, has released his top five security threats to watch out for in 2013.

  • Comment: What will 2013 bring for cyber security?
  • IT security trends in 2013: Cyber war not on the horizon
  • Middle East Tackles Cyber Security Threat With World Class Training
  • Together the Mobile and Retail Industries can energise and invigorate the c...
  • Who cares about protecting small merchants from a security breach?
  • nCircle predicts exploits, security threats and hacks will mutate in 2013
spacer

More than 1 in 4 workers unaware of phishing threat

Research from PhishMe has uncovered the scale of the phishing problem in UK businesses with more than a quarter (27%) of office workers not knowing what phishing is, more...

Top-10 Telecom Trends for 2013 What to Watch in the Coming Year

From Telecom Expenses Management to WIndows 8 - MDSL takes us on a tour of next year's possible big surprises.
spacer

Infosecurity Europe Exhibitors look ahead to 2013

Jason Hart, VP Cloud Solutions, EMEA at SafeNet, starts off with data protection - something we all love and ignore followed by Brian Tokuyoshi, Product Marketing Manager, Palo Alto who...
spacer

Citigroup goes out to tender as Tangoe TEM implementation shelved

Citigroup has recently put out a request for proposal (RFP) for a telecoms expense management (TEM) system for the UK.
spacer

Taking Time Out Time to reflect on 2012

Below is a round up of what Reuven Harrison, CTO of Tufin Technologies sees as some of the significant IT developments of 2012 that will affect what will happen the...
spacer

Use your 'Mince Pies' says PhisMe - look out for the The Mega Cyber-Monday IT Scam

The 3rd of December was the UKs Mega Monday predicted to be the biggest online shopping day ever. With this influx of online purchases, employees need to beware the...
spacer

Wick Hill Group chairman gives his top five IT trends for 2013

Ian Kilpatrick, chairman of Wick Hill Group, gives us his top five IT trends for 2013
spacer

SIX deploys tufin secureapp to automate application connectivity management

Tufin Technologies, the provider of Security Policy Management solutions, today announced SIX as the first Tufin customer to deploy its new product, SecureApp, in a production environment. SecureApp enables to...
  • UK Workers Feel Online Privacy Is Threatened by BYOD Creep says ISACA
  • What's that Hanging in the Tree? Looks like IT Security to me
  • Imperva Antivirus Report Nails 'Woefully Inadequate' Offerings from Vendors
  • Merry Christmas SMS the festive origins of our communications obsession
  • Philip Morris International, CIBC and Alberta Energy are all winners in Varonis' First Data Governance Awards
  • Retail Business Technology Expo strengthens executive team with the appointment of retail veteran Richard Mader
  • Building business with BYOD and mobile business applications
  • Security tests show the need for a holistic approach to PC defences says Avecto

gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.