How can businesses maintain IT security in a hybrid working model?

By Claire Price of QMS International, one of the UK’s leading ISO certification bodies Businesses now have the green light to go back to work, but your organisation may not be returning to its old working practices. So, if a hybrid model is being adopted, what can you do to ensure that information stays secure? […]
How much does penetration testing cost?

By Redscan Making sense of pen test pricing Commissioning a penetration test is an important step in helping to enhance your organisation’s cyber security resilience. Pen testing costs vary from a few thousand to several thousand more, so it’s essential to ensure that the pen testing you select enables you to achieve the best security outcomes […]
WEBINAR: Keeping critical national infrastructure secure

Cyber-attacks are now arguably the biggest threat to the UK’s national infrastructure. In recent months we have seen ransomware on food production and fuel transportation wreak havoc in the United States. So how are we keeping the UK safe? Join Varonis Field CTO, Brian Vecci, as we host a panel session with senior experts from Sellafield […]
The email authentication challenge

Email is the #1 way attackers target an organisation’s customers and email ecosystem. DMARC (Domain-based Messaging, Reporting & Conformance) authentication, specifically with an enforcement policy of Reject, is the single most effective way to close this vulnerability inherent to email. While the premise of authentication is straightforward, organisations can encounter roadblocks and challenges along the […]
WEBINAR: Ransomware Has Evolved, And So Should Your Company

By Veriato 2021 Has been an interesting year for Ransomware attacks so far. After plaguing countless victims with dreaded ransom notes and bringing the US Colonial Pipeline and other large corporations to their knees, the Ransomware attack method has built a strong reputation for inflicting cyber terror on consumers and businesses alike. As cyber criminals […]
Cybersecurity in Financial Services: Remaining compliant and reducing risk with automation

By LogRhythm Businesses in the financial services sector have to manage enormous risk, wealth and personally identifiable information (PII), all while meeting strict regulatory requirements. As the proliferation of financial data continues to grow, organizations face the task of continuously protecting that information and keeping it secure, while maintaining a reputation in the financial sector. Despite this, many […]
Normalising data leaks: A dangerous step in the wrong direction

It was only recently, in early April, when it came to light that the personal data from over 500 million Facebook profiles had been compromised by a data leak in 2019. And since then, an internal Facebook email has been exposed, which was accidentally sent to a Belgian journalist, revealing the social media giant’s intended strategy for dealing with […]
The data dichotomy and the vital importance of effective self-regulation

The data privacy debate that has raged for the past decade has patently failed to meet the needs of either industry or consumers. Legislative change continues to challenge digital marketing models – and has had little impact on consumer trust: Edelman’s 2021 Trust Barometer cites an era of “information bankruptcy”, with global trust levels at […]
A new chapter in remote IoT security

By Keith Glancey, Systems Engineering Manager at Infoblox When the COVID-19 pandemic struck, businesses around the world found themselves forced to adapt quickly in order to survive. IT and security teams took centre stage, and were tasked with supporting a newly-remote network of employees and maintaining business continuity. Many companies emphasised ‘connectivity first,’ relegating security to […]
WEBINAR: Overcoming The Challenges Of Selecting An Insider Threat Detection Tool

By Veriato In a crowded market with so many new products being released, it can often be hard to make sure you’re getting the right tool for your organization’s security needs. Purchasing an Insider Threat Detection tool for your organization requires extensive research, which can be very time-consuming. In our latest webinar, we try and […]