Threat Modelling: Understanding The Business Impact Of A Successful Attack

August 18th, 2017|Categories: Data Protection|

The overwhelming number of potential threats to your organization from cyber criminals, hackers and insider actors, is a challenge for even for the most experienced [...]

GDPR – Are you thinking “What’s All The Fuss About?”

August 8th, 2017|Categories: Data Protection|

We are all increasingly concerned about how our personal data is used and what measures are in place to protect it from falling into the [...]

How To Reduce Breach Detection Times

June 30th, 2017|Categories: Data Protection|

The Invisible Enemy? By Peter Boyle, CTO, Burning Tree Two weeks before WannaCry crippled the NHS, halted car production in Japan, and disrupted rail systems [...]

What happens to IAM when it’s all in the cloud?

April 3rd, 2017|Categories: Cloud, Identity Access Management|

In our experience, Identity and Access Management (IAM) is often an afterthought when organisations migrate to the cloud. 99.9% of our customers will have already [...]

Jackson Shaw of One Identity talks Digital Transformation with Peter Boyle

March 31st, 2017|Categories: Digital Transformation|

Burning Tree were at the Gartner IAM Show on 6 March, meeting with information security professionals and keeping abreast of innovation in the sector. Peter [...]

Creating digital identity strategies to enable digital transformation

March 6th, 2017|Categories: Digital Transformation|

Over the last few years there has been growing acceptance of the need for digital transformation. Yet, the term digital transformation covers many different ideas [...]

Load More Posts