Cybersecurity’s biggest asset: Why use the cloud?

The cloud is one of those hot buzzwords that gets thrown around a lot both in the tech world and in our daily lives. No longer reserved for IT departments alone, the cloud has become something that we depend upon greatly, especially in the way companies go about their business. And it’s about to become […]
Cybersecurity and Financial Services – How Can Organisations Combat the Threat?

By Genevra Champion, Sector Marketing Manager, IT Governance The financial services industry is naturally a lucrative target for cyber criminals. Financial organisations trade and control vast amounts of money, as well as collect and store customers’ personal information so clearly, a data breach could be disastrous for an industry that is built on trust with its customers. The financial services industry is […]
Shadow IT is everywhere – are you at risk?

By EveryCloud Cloud services – SaaS and IaaS – are everywhere. Businesses rely on their flexibility and the productivity they deliver. But what about the cloud services you don’t see? Business-led cloud services, or “Shadow IT”, have sprung up in dozens of departments and project teams. In every corner of the business and outside the […]
Evolving mobile device management strategies

By Dom Hume, VP Product & Technical Services, Becrypt As organisations continue to innovate to realise efficiencies through the use of increasingly sophisticated and pervasive mobile technologies, many are continually challenged by the risks associated with managing an ever growing device estate. Successfully managing the complexity of multiple software and hardware mobile platforms necessitates a […]
WEBINAR: 6 Critical Steps for Securing Office 365, Thursday 9th May at 10am BST

Microsoft Office 365 continues to be the most used cloud-based application adopted by organisations worldwide. As a popular productivity suite, its capabilities are broad and help users collaborate with people both inside and outside their organisation. A broad set of capabilities, however, creates challenges in accessing and protecting the data that is used across the […]
READER OFFER: Benchmark yourself against the industry standard for vulnerability management

How do you currently manage vulnerabilities within your organisation? Discover where you stand against your peers with our free self-assessment and get a relevant, actionable executive report! Our assessment takes less than 4 minutes and the first 10 people to complete it will receive a £5 Amazon Voucher! Click here for your free self-assessment.