Army couples needed for relationship study » Participants hold the key to improved relationships after deployment DENVER: Judy Davis is an acti... Global Association ISACA reaches 45 years and 115,... » London, UK: In 1969, the first message was sent between computers via ARPANET, the precursor o... Datum Datacentres announces fast growing cloud and... » FARNBOROUGH: Datum Datacentres has announced the official launch of the Datum Cloud Hub, the co-loca... ANIMATRONIC MANNEQUIN TO TEST PROTECTIVE EQUIPMENT » The Ministry of Defence has invested £1.1m in a new state-of-the-art robotic mannequin that will tes... Options upgrades low latency route between Cartere... » New York: Options has announced that it has upgraded the route between the firm’s data center facili... Cloud World Forum examines security, privacy and r... » London: As the adoption of cloud computing continues to grow across the world, security, privacy and... U.S. Air Force selects Cubic for Moroccan P5 Air C... » Cubic Defense Systems, a subsidiary of Cubic Corporation has been awarded a contract valued at more ... Tokenless two-factor authentication defies “Heartb... » London: The existence of Heartbleed, a vulnerability in the OpenSSL open source software, was recent... Advanced application security now standard on Barr... » Basingstoke:  Barracuda Networks, Inc. has announced that it will offer advanced application securit... Check Point provides multiple protections against ... » Check Point has announced that its network security products offer multiple protections against the ...


Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.


Case Studies

   Display #  
1 Cryptzone survey reveals SharePoint users are breaching security policies Dulcie McLerie
2 Understanding risk from a business perspective is a top security concern for organisations: Survey John Aduma
3 UK-Wide shortage of paid market research participants THE EDITORIAL TEAM
4 UK businesses all talk and no action when it comes to insider threats, reveals LogRhythm research John Aduma
5 More than half of IT professionals make undocumented changes to IT systems Netwrix survey finds Peter Rennison
6 Voltage Security ranked the top email encryption software of 2014 Lara Lackie
7 86% of customers would shun brands following a data breach Xanthe Vaughan Williams
8 Overwhelming majority of IT professionals seek on-premises alternatives for enterprise file sharing, new research shows Lara Lackie
9 Only 11% see organizational resistance to cloud uptake in Europe compared with 53% in the US THE EDITORIAL TEAM
10 Parallels survey of IT professionals finds Macs are moving beyond BYOD phenomenon, now considered for broader corporate deployment Sam Evans
11 New report identifies the social and economic value of eServices up to 2020 Stéphanie de Labriolle
12 Survey reveals that overconfidence threatens the security of UK's enterprises THE EDITORIAL TEAM
13 New survey reveals failure to automate licensing and entitlement management is missed opportunity for software vendors VIDUSHI PATEL
14 Leading Global analyst firm highlights ExtraHop’s innovative wire data analytics platform in independent report DAWN NICHOLLS
15 Varonis named 'clear market leader' Lara Lackie