NEWS
Privileged Passwords: Five Reasons why Separation is Essential
  • Posted on 4th February 2019 in by Phil Alsop

The threat from internal and external cyber attackers increasingly involves stealing the passwords of system administrators with privileged accounts. Steal those passwords and you have access to the critical infrastructure of servers, databases, firewalls, routers and switches that the organisation...

Read More
NEWS
Be cyber attack free during the festive period
  • Posted on 10th December 2018 in by Phil Alsop

It has been a tumultuous year for cybersecurity, with endless security breaches hitting the headlines. Perhaps most recently, social media giant, Facebook, saw its largest security breach ever in September, with 50 million Facebook users allegedly left exposed by a security flaw. It’s no surprise...

Read More
NEWS
Top Ten Cybersecurity Predictions for 2019
  • Posted on 19th November 2018 in by Phil Alsop

By Ian Kilpatrick, EVP Cyber Security, Nuvias Group.

Read More
NEWS
The Magnificent Seven: How to modernise your security operations
  • Posted on 19th November 2018 in by Phil Alsop

The main issues we see arise with cybersecurity strategies seem to link to efforts that arise when businesses look to modernise these operations – they have too few people, too many security tools and too little insight on where the attacks are coming from and how they are be carried out. By...

Read More
NEWS
How unguarded privileged access can turn a breach into a catastrophe

It has become increasingly accepted by many organisations that a security breach, in some form or...

Read More
NEWS
A flexible approach to privacy

The ongoing impact of GDPR, by Dan Harding, Director, Sign In App.

Read More
Is it time for a cyber hygiene check-up?

By Katie Curtin-Mestre, VP of Product and Content Marketing, CyberArk.

Read More
Iron Rain: What Defines a Cyber Insurgency?

By Tom Kellermann, Chief Cybersecurity Officer, and Rick McElroy, Security Strategist at Carbon...

Read More
Tackling poor password hygiene habits head-on

Alvaro Hoyos, Chief Information Security Officer at OneLogin.

Read More
Threat analytic services on-demand have arrived

By Christopher Steffen, CISSP, CISA, Technical Director.

Read More
2018 will be the Year of Automation when ‘big, bad attacks’ will target automated technology processes

Carl Herberger, vice president of security solutions at Radware, has made his top three ...

Read More
2018 predictions - from cryptocurrency mining to ‘fileless’ attacks

By Travis Farral, Director of Security Strategy at Anomali.

Read More

Videos

Andy Bevan, Head of Propositions and Strategy Consulting at Daisy Corporate Services, discusses recent research findings which reveal that two-thirds of IT leaders say that legacy infrastructure is creating a...
Libby Duane Adams, Chief Advocacy Officer and Co-Founder at Alteryx, believes that businesses can’t afford to fall behind in their AI and data strategy – they must accelerate it to stay ahead of the curve...
Andrew Fettes-Brown, Rider Levett Bucknall (RLB) Global Board Director, Head of Data Centres at RLB UK and Europe, outlines the results of the company’s recent research, the results of which suggest that the...
Stephen Douglas, Head of Market Strategy at Spirent, discusses the company’s 5th annual 5G outlook report, which finds that 5G Standalone (SA) market is picking up significant speed, alongside similar...

News

Newly-expanded distribution agreement will enable Westcon to drive adoption of Palo Alto Networks’ industry-leading cybersecurity solutions across four new countries.
William Asare joins to strengthen Cantium’s commitment to the education sector and drive growth.
Smith joins as companies around the globe seek to move away from legacy analytics technology, embrace generative AI to transform BI, and spark their Data Renaissance.
The combined company will bring together two cybersecurity SIEM and UEBA innovation leaders with renowned and demonstrated track records in serving customers with effective threat detection, investigation, and...