The Synack platform expands to confront the cyber skills gap

By Peter Blanks Chief Product Officer, Synack At Synack, we’re committed to making the world a safer place. We’re doing that by helping organizations defend themselves against an onslaught of cyberattacks. We’re doing it by harnessing the tremendous power of the Synack Red Team, our community of the most skilled and trusted ethical hackers in the […]
Responding to the rising ransomware threat

By Redscan, a Kroll Business In October 2021, Sir Jeremy Fleming, the head of GCHQ, disclosed that the number of ransomware attacks in the UK has doubled in just one year. Recently described as “the most immediate danger to UK businesses,” by Lindy Cameron, the CEO of the UK’s National Cyber Security Centre, ransomware continues […]
How to simplify access reviews

By Tenfold Security More and more cybersecurity regulations require businesses to restrict access to data on a need-to-know basis. This best practice is also known as the principle of least privilege. Put simply, it means that members of your organization should only have access to files and resources they absolutely need in order to do […]
VIRTUAL EVENT: Step into the Future of Cybersecurity at Tessian’s Human Layer Security Summit

The threats of the future are here, AI is now being used to construct more convincing phishing attacks than ever before. Singapore GovTech will explain exactly what this means for the future of phishing in one of Tessian’s game changing sessions at the action packed Human Layer Security Summit. Join other security leaders as Tessian’s […]
Cutting through the noise

By Rapid7 Imagine this, your connected devices at home and office go rogue. The car drives you somewhere else instead of home, the office devices leak intellectual property and employee data, the home appliances reveal information about those at home. The thought of this happening would probably send shivers down your spine. Though it’s only […]
WEBINAR: Top 5 reasons why you need an access management solution

By Tenfold Security Do you know WHO in your organization has access to WHAT systems and data? If you don’t know the answer, chances are you haven’t yet employed an IAM solution. And that means your company is at high risk for data theft. You might be struggling to invest the administrative efforts required to […]
The future of cybersecurity is autonomous

Censornet’s Autonomous Integrated Cloud Security gives mid-market organisations the confidence and control of Enterprise-Grade cyber protection. Our platform integrates attack intelligence across email, web, and cloud to ensure our clients’ cyber defences react at lightning speed, day and night. The Censornet platform is simple and effective, not costly and complex. For our millions of users […]
How to mitigate non-malicious insider risk (and why employee awareness is key)

‘Your people are your most important asset’ is a well-worn phrase. However, in the wrong environment, employees can also present a substantial cyber-threat to organizations, and evidence suggests this problem keeps on growing: there’s been a 47% rise in the frequency of incidents involving insider threats between 2018 and 2020, with over half (62%) of […]
Cloud Access Security Broker (CASB) was once thought of as a ‘nice to have’. Today, it is essential

A CASB is a Cloud Application Security solution which protects a modern mobile workforce by analysing, managing and protecting user interactions with cloud apps. It offers organisations the ability to control how their data is shared to the cloud and prevent the use of unauthorised or potentially dangerous applications. Censornet Cloud Application Security (or CASB) […]
UK CISOs driving blindfolded | 75% say they’re at greater risk of cybersecurity attacks | 77% admit they’ve experienced an incident in the last 12 months

BlueFort Security’s independent research of 600 CISOs & 2k office workers will be discussed at a FREE event for UK Cybersecurity Experts Join us at BlueFort.Live – an event for and about UK CISOs 3:30pm BST | 15th October 2021 Book Your Place The research will be discussed in our hybrid event – a 1-hour […]