WHITE PAPER: Get total endpoint security with KACE

As an IT professional, you’re likely under pressure to manage an increasingly complex environment, while also protecting your network and devices from cyberthreats. Read this white paper to discover how the KACE Unified Endpoint Manager by Quest enables you to streamline complex endpoint management tasks and gain greater control of both traditional and modern managed […]
Is your business CyberFit?

If your business relies on Microsoft 365, then it’s essential that you take the time to protect it by backing up your Microsoft 365. Learn how Acronis Cyber BackUp can help avoid downtime, protect data and improve security. We aim to protect your business, whilst eliminating complexity and reducing cost. We help you to upgrade cybersecurity […]
To succeed, enterprise cybersecurity needs IoT scale

By Nigel Thompson, VP Product Marketing at BlackBerry There are few things in cybersecurity that aren’t up for endless debate. Yet one thing that is universally agreed upon is that anything with an Internet address can and will be attacked. We’ve certainly witnessed this happening on a large scale with the proliferation of Internet of things […]
Hold tight for 2021: A volatile global outlook will continue to fuel fraud and cyber-threats

By Ian Newns, Fraud Specialist at RSA Security 2020 was full of surprises. But one thing that didn’t come as a revelation was the speed and agility with which the criminal community reacted to unfolding global events. We’ve often witnessed groups behind phishing attacks, for example, capitalise on breaking news stories and consumer behavioural change to […]
WEBINAR: Security Champions – Making the Business Case

You have an awesome idea. You plan it in full. You share it with your colleagues. What happens next? Hang-on… They’re not jumping up and down. In fact, they’re frowning. They don’t get it! Sound familiar? When that happens remember: “If you want something to change, only you can make that happen” Join us – […]
5 innovative cybersecurity training methods to try in 2021

By Juta Gurinaviciute, Chief Technology Officer at NordVPN Teams As much as 88% of data breaches are caused by human error, but only 43% of workers admit having made mistakes that compromised cybersecurity. In the past year a third of the breaches incorporated social engineering techniques and the cost of a breach caused by a human error averaged to $3.33 million. […]
Where is cybersecurity in 2020 and where are we heading?

At the start of 2020, smart businesses were already preparing their security practices against threats including ransomware and phishing. That was before the pandemic, which has resulted in a shift in traditional working practices and a significant rise in remote working this year that has introduced the possibility of additional security risks. Paul Colwell (pictured), […]
Escaping from Data Lockdown with a Digital Evolution

With data amassing at an exponential rate, digital transformation continues to be throttled as businesses struggle to achieve the insight they need from the data. To achieve value from data, businesses need to be able to access what they need, when they need, by the right people, in a usable format. Peter Ruffley, CEO, Zizo, has […]
LogRhythm NextGen SIEM Platform – Build your security program on a solid foundation

By LogRhythm Align your team, technology, and processes to see broadly across your IT and operating environments, uncover threats, and minimise risk — all within a single, unified platform. The LogRhythm NextGen SIEM Platform is at the centre of thousands of SOCs worldwide. Detect threats earlier and faster. When it comes to stopping threats, seconds matter. That’s […]
The state of the security team: Are executives the problem?

By LogRhythm A global survey of security professionals and executives by LogRhythm Amid a slew of statistics on how job stress is impacting security professionals, we sought to learn the causes of the tension and anxiety — as well understand potential ways teams might alleviate and remediate the potential of job burnout. We ran a […]