The future of cybersecurity is autonomous

Censornet’s Autonomous Integrated Cloud Security gives mid-market organisations the confidence and control of Enterprise-Grade cyber protection. Our platform integrates attack intelligence across email, web, and cloud to ensure our clients’ cyber defences react at lightning speed, day and night. The Censornet platform is simple and effective, not costly and complex. For our millions of users […]
How to mitigate non-malicious insider risk (and why employee awareness is key)

‘Your people are your most important asset’ is a well-worn phrase. However, in the wrong environment, employees can also present a substantial cyber-threat to organizations, and evidence suggests this problem keeps on growing: there’s been a 47% rise in the frequency of incidents involving insider threats between 2018 and 2020, with over half (62%) of […]
Cloud Access Security Broker (CASB) was once thought of as a ‘nice to have’. Today, it is essential

A CASB is a Cloud Application Security solution which protects a modern mobile workforce by analysing, managing and protecting user interactions with cloud apps. It offers organisations the ability to control how their data is shared to the cloud and prevent the use of unauthorised or potentially dangerous applications. Censornet Cloud Application Security (or CASB) […]
UK CISOs driving blindfolded | 75% say they’re at greater risk of cybersecurity attacks | 77% admit they’ve experienced an incident in the last 12 months

BlueFort Security’s independent research of 600 CISOs & 2k office workers will be discussed at a FREE event for UK Cybersecurity Experts Join us at BlueFort.Live – an event for and about UK CISOs 3:30pm BST | 15th October 2021 Book Your Place The research will be discussed in our hybrid event – a 1-hour […]
How can businesses maintain IT security in a hybrid working model?

By Claire Price of QMS International, one of the UK’s leading ISO certification bodies Businesses now have the green light to go back to work, but your organisation may not be returning to its old working practices. So, if a hybrid model is being adopted, what can you do to ensure that information stays secure? […]
How much does penetration testing cost?

By Redscan Making sense of pen test pricing Commissioning a penetration test is an important step in helping to enhance your organisation’s cyber security resilience. Pen testing costs vary from a few thousand to several thousand more, so it’s essential to ensure that the pen testing you select enables you to achieve the best security outcomes […]
WEBINAR: Keeping critical national infrastructure secure

Cyber-attacks are now arguably the biggest threat to the UK’s national infrastructure. In recent months we have seen ransomware on food production and fuel transportation wreak havoc in the United States. So how are we keeping the UK safe? Join Varonis Field CTO, Brian Vecci, as we host a panel session with senior experts from Sellafield […]
The email authentication challenge

Email is the #1 way attackers target an organisation’s customers and email ecosystem. DMARC (Domain-based Messaging, Reporting & Conformance) authentication, specifically with an enforcement policy of Reject, is the single most effective way to close this vulnerability inherent to email. While the premise of authentication is straightforward, organisations can encounter roadblocks and challenges along the […]
WEBINAR: Ransomware Has Evolved, And So Should Your Company

By Veriato 2021 Has been an interesting year for Ransomware attacks so far. After plaguing countless victims with dreaded ransom notes and bringing the US Colonial Pipeline and other large corporations to their knees, the Ransomware attack method has built a strong reputation for inflicting cyber terror on consumers and businesses alike. As cyber criminals […]
Cybersecurity in Financial Services: Remaining compliant and reducing risk with automation

By LogRhythm Businesses in the financial services sector have to manage enormous risk, wealth and personally identifiable information (PII), all while meeting strict regulatory requirements. As the proliferation of financial data continues to grow, organizations face the task of continuously protecting that information and keeping it secure, while maintaining a reputation in the financial sector. Despite this, many […]