Press Release

Perforce customers honoured in the UK’s leading games industry awards

Wokingham, UK, July 26, 2017 - Perforce, the most widely used version control and collaboration solution in the game development industry, is delighted to announce that 20 of its customers – from start-ups studios to large organizations - have been honoured by the Develop Awards, including Studio of the Year Guerilla Games.

8 customers were outright winners of 11 award categories:

RiskIQ Reveals Digital Footprint Snapshot – On-demand, Cost-Effective External Asset Intelligence Report

LONDON, UK – July 25, 2017 – RiskIQ, the leader in digital threat management, today unveiled RiskIQ Digital Footprint Snapshot, which provides organisations with an automated, on-demand intelligence report of their internet-facing digital assets. Snapshot reports offer a quick, easy, and cost-effective way to discover and understand the diverse, distributed, and dynamic set of digital assets connected to an organisation outside the firewall. Enterprises can incorporate this digital footprint intelligence as part of their integrated risk management program aimed to reduce their attack surface and protect their business. 

In an Evil Internet Minute, £656,393 is Lost to Cybercrime, Reveals RiskIQ

London, UK, 19 July, 2017 – With cybercriminals costing the global economy £345 billion last year alone[1], Digital threat management leader RiskIQ has examined the growing volume of malicious activity on the Internet to reveal the inaugural ‘Evil Internet Minute’. In a single evil internet minute, close to £656,393 is lost to cybercrime and 1,080 people fall victim. Despite businesses’ best efforts to guard against external cyber threats, spending up to £109,942[2] in 60 seconds, bad actors continue to proliferate online.

Interoute named a Leader in Gartner’s MQ for Managed Hybrid Cloud Hosting, Europe for 4th consecutive year

London, 4 July 2017 – Interoute has been named a Leader in the Gartner Magic Quadrant for Managed Hybrid Cloud Hosting, Europe[1], for the fourth consecutive year. The annual report provides businesses with an impartial evaluation of vendors’ strengths and capabilities.

New report from CREST highlights the need to improve cyber security in Industrial Control Systems

29 June 2017: There is a pressing need to improve cyber security in Industrial Control System (ICS) environments to avoid future breaches that could impact critical national infrastructure concludes CREST, the not-for-profit accreditation body representing the technical information security industry, in its latest position paper, ‘Industrial Control Systems: Technical Security Assurance’. The report highlights a number of challenges and suggests that more technical security testing has a significant role to play in ensuring higher levels of security assurance are met.

The Dynamic Spectrum Alliance supports the European Commission’s European Electronic Communications Code

Brussels, Belgium, 27 June 2017: The Dynamic Spectrum Alliance (DSA) welcomes the European Commission’s proposed European Electronic Communications Code (EECC) and has suggested recommendations to ensure the Code’s spectrum provisions extend connectivity for Europe’s citizens now and in the future. The EECC is part of the European Commission’s plans for improved connectivity in Europe through Wi-Fi, 5G, and high-speed Gigabit broadband capable of supporting upcoming technologies and bandwidth-hungry applications. However, these applications require sufficient spectrum to function in the first instance.

Millennial Jack Parsons Crowned Young Digital Leader 2017

Jack Parsons, the 23 year old CEO of yourfeed, has been awarded Young Digital Leader of the Year award at a prestigious ceremony in London’s St Pancras Renaissance Hotel by Digital Leaders 100.

The judging panel was made up of esteemed digital veterans including Maggie Philbin from TeenTech, Accenture’s Emma McMuigan, Chris Yui from Uber and Jacqueline de Rojas from techUK. The winners are selected from a 50% public vote and 50% judges vote. Jack was the stand out winner.

Shining example

WannaCry Exposed Gaping Risk Window between Identifying Vulnerability Risk and Fixing It

Maidenhead, U.K. – June 20, 2017 – When WannaCry hit, the world learned that for two months a patch had been available that would have prevented the problem. But its victims were those that hadn’t yet deployed this patch. As many companies discovered the hard way, there is an unacceptable ‘risk window’ that persists between the discovery of a software vulnerability and when the patch is successfully installed. In 2016 17,147 vulnerabilities were recorded in 2,136 products from 246 vendors. 81 percent of those vulnerabilities had patches available on the same day as disclosure. But, on average, it takes companies 186 days to completely install those patches[1].

Research Shows Channel Trust Issues Impact Commercial Opportunities

Reading, UK - 12 June, 2017 - Independent research recently conducted on behalf of Zyme, the market leader in the rapidly growing discipline of channel data management (CDM), has highlighted that 80% of consumer electronics manufacturers believe they have lost commercial opportunities because of limitations in their ability to collect and analyse channel data. Of equal concern is that 43% said they have shared data with the board in which they are not completely confident.

Biggest security threats: Failures in planning, implementation and monitoring

Free presentations on Nuvias (incorporating Wick Hill) stand from leading security industry experts - including State-of-the art Protection, Ransomware, DDoS, and Phishing

June 6, 2017 - Probably the biggest security threat to companies today, claims Ian Kilpatrick, EVP Cyber Security for Nuvias Group (incorporating Wick Hill) is the failure to strategically plan, implement and monitor a cyber security strategy. This is closely followed by the failure of companies to adequately train and monitor their staff in how to keep both themselves, and then by implication their business, cyber safe. Both of these security issues represent major tactical and strategic cyber risks.