5 Minutes With… Tenfold Security’s Helmut Semmelmayer
Helmut Semmelmayer currently heads channel sales at the software company tenfold software. Having worked on countless customer projects, he has extensive knowledge of the challenges that organizations face when it comes to protecting data from unauthorized access. His goal is to educate businesses and build awareness for current and future access-based attack patterns… Tell us […]
How to mitigate non-malicious insider risk (and why employee awareness is key)
‘Your people are your most important asset’ is a well-worn phrase. However, in the wrong environment, employees can also present a substantial cyber-threat to organizations, and evidence suggests this problem keeps on growing: there’s been a 47% rise in the frequency of incidents involving insider threats between 2018 and 2020, with over half (62%) of […]
Cloud Access Security Broker (CASB) was once thought of as a ‘nice to have’. Today, it is essential
A CASB is a Cloud Application Security solution which protects a modern mobile workforce by analysing, managing and protecting user interactions with cloud apps. It offers organisations the ability to control how their data is shared to the cloud and prevent the use of unauthorised or potentially dangerous applications. Censornet Cloud Application Security (or CASB) […]
UK CISOs driving blindfolded | 75% say they’re at greater risk of cybersecurity attacks | 77% admit they’ve experienced an incident in the last 12 months
BlueFort Security’s independent research of 600 CISOs & 2k office workers will be discussed at a FREE event for UK Cybersecurity Experts Join us at BlueFort.Live – an event for and about UK CISOs 3:30pm BST | 15th October 2021 Book Your Place The research will be discussed in our hybrid event – a 1-hour […]
How can businesses maintain IT security in a hybrid working model?
By Claire Price of QMS International, one of the UK’s leading ISO certification bodies Businesses now have the green light to go back to work, but your organisation may not be returning to its old working practices. So, if a hybrid model is being adopted, what can you do to ensure that information stays secure? […]
eBOOK: How to get started with Zero Trust Network Access (ZTNA)
By Censornet Zero Trust is a paradigm that is becoming a guiding philosophy for the cybersecurity industry. But the technology that will turn the thinking into a reality is Zero Trust Network Access (ZTNA). By 2023, 60% of enterprises will have phased out VPNs (virtual private networks) and replaced them with ZTNA, Gartner has predicted. […]
Industry Spotlight: tenfold Software
tenfold is an Identity and Access Management solution designed to meet the needs of mid-market organizations. Thanks to a data importing tool and a large set of out-of-the-box plugins, tenfold can be set up quickly and easily, providing businesses with a central platform for managing users and permissions across all their systems. The ability to […]
Security IT Summit is just weeks away – Secure your place!
Don’t forget to claim your complimentary guest pass to the Security IT Summit and gain access to insightful seminar sessions from industry thought leaders. The event takes place November 4th at the Hilton London Canary Wharf, providing a platform for senior IT/cyber security professionals and their suppliers – for one-to-one business meetings, learning and networking. Confirmed seminar sessions […]
Do you specialise in Employee Security Awareness? We want to hear from you!
Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in October we’re focussing on Employee Security Awareness solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re an Employee Security Awareness […]
Why quantifying your cyber-risk is crucial for Vulnerability Management… And how to do this effectively
We live in a risky world. We are assessing risk in almost every moment of our lives, yet most of us don’t quantify our risk unless it’s a clear and present danger. You won’t walk down a dark alley because the threat is imminent. Eating fast food might be just as risky, but the effects […]