The Cloud Revolution: A call for improved security measures

By Aleksandr Värä, Technical Sales Director of Crayon Recent years have seen a significant shift towards the adoption of cloud services by businesses, and the pace is only accelerating. Over 80% of IT leaders already use hybrid cloud solutions, which combine the strengths of public cloud providers like AWS and Google Cloud with private hardware. […]
Six key considerations for ITAD security

IT asset disposition (ITAD) is the practice, method and means of disposing of IT hardware. The legal and compliance demands companies face mean that the data held on computers, devices and other physical assets can become a liability without an audited process in place. With new methods for data protection becoming increasingly crucial for business […]
The Cyber Security Roadshow you should be at in London on 19th April!

Your peers are registering for Tessian’s Fwd: Thinking Roadshow and so should you! This half day, complimentary event will take place aboard HMS Belfast, London, and is dedicated to helping forward thinking security teams navigate the ever-changing threatscape. Hear from the top CISOs and industry experts who have paved the way when it comes to […]
The role of network cameras as sensors to support digital transformation

Axis Communications’ Linn Storäng explains how high-quality video data on open IT architecture might support the digital transformation of business functions… To think of the network camera – an essential part of any company’s security infrastructure – as being a tool for security purposes alone could be a missed opportunity. Today’s cameras are versatile IoT […]
Say goodbye to traditional security training: How to keep your staff engaged!

As the saying goes, what got you here, won’t get you there. While the traditional method of once-a-year security awareness training for your staff may have been an acceptable method in the early 2000’s, times change, and so do the needs of staff. Simply providing information to employees is not enough. For best results, information delivered […]
INDUSTRY SPOTLIGHT: Protect your top attack vectors, across all channels by Perception Point

Perception Point is a Prevention-as-a-Service company for the fastest and most accurate next-generation detection, investigation, and remediation of all threats across an organisation’s main attack vectors – email, web browsers, and cloud collaboration apps. Perception Point streamlines the security environment for unmatched protection against spam, phishing, BEC, ATO, ransomware, malware, Zero-days, and N-days well before […]
Making the right hybrid choice when it comes to UC

As hybrid working strategies mature, companies are fast discovering that choice is vital. Employers need to offer a flexible approach to balance diverse home and office working preferences. But they must also provide a choice of technology options, especially in key unified communication (UC) tools. Consolidating onto a single UC platform may appear to be […]
What more, if anything, should governments be doing about cyber actors?

By Will Dixon, Global Head of the Academy and Community at ISTARI Cyberattacks are becoming more frequent, and their potential consequences are becoming more severe. With Critical National Infrastructure and other important services constantly in the virtual crosshairs of both state actors and cybercriminals, it is entirely conceivable that an attack, or a series of […]
OPINION: Don’t let fatigue be the cause of MFA bypass

By Steven Hope (pictured) , Product Director MFA at Intercede If names such as Conficker, Sasser and MyDoom send a shiver down your spine, you are not alone. In the not-too-distant past computer viruses, whether simple or sophisticated had the power to cripple organisations large and small, as cybercriminals sought to wreak havoc, and gain notoriety […]
INDUSTRY SPOTLIGHT: iSTORM – Your trusted advisory service

iSTORM believe that strong privacy and information security practices are beneficial to every organisation. Their team has more than 2 decades experience covering information security, cyber security, ISO 27001, information governance, data protection and penetration testing. iSTORM understand the issues that 21st century businesses face and our hand-picked team of experts are here to provide […]