RSA Conference USA 2017: 3 Reasons To Attend

January 18th, 2017|Categories: Conference|Tags: , , |

Next month is the annual RSA Conference in San Francisco. Like many UK and European based organisations, we attend the RSA Conference event (#RSAC) every [...]

How to Automate Governance, Risk and Compliance (GRC) to Reduce Costs

December 13th, 2016|Categories: Data Protection|Tags: , , , |

IT Governance, Risk Management discipline, Information Security Policy and legal compliance requirements all place a burden on companies to ensure their governance, risk and compliance [...]

Core Principles Of Building A Secure Network Architecture

November 22nd, 2016|Categories: Data Protection|Tags: , |

In many organisations IT projects are designed to address business objectives or as operational solutions without any thought about security. The security ‘solution’ is often [...]

Lessons from Snowden: The Unmanaged SSH Key Time Bomb

October 12th, 2016|Categories: Data Protection|Tags: , |

Last month Snowden (the movie) was released in the US. While the film has received mixed reviews, the story behind the movie has played out [...]

Can Your IT Systems Heal Themselves? Automation and Cyber security

September 22nd, 2016|Categories: Data Protection|Tags: , |

The idea of self-healing networks is very attractive to any IT Director who wants to use valuable resources - IT staff and budget - [...]

Insider Threats: Who Is The Biggest IT Security Threat In Your Organisation?

August 8th, 2016|Categories: Data Protection|Tags: , |

It is an undeniable fact that in today's digital world, we are all pretty much reliant on information technology and the Internet to run [...]

Load More Posts
burningtree.co.uk