Blog

Creating digital identity strategies to enable digital transformation

March 6th, 2017|Categories: Digital Transformation|

Over the last few years there has been growing acceptance of the need for digital transformation. Yet, the term digital transformation covers many different ideas [...]

RSA Conference USA 2017: 3 Reasons To Attend

January 18th, 2017|Categories: Conference|

Next month is the annual RSA Conference in San Francisco. Like many UK and European based organisations, we attend the RSA Conference event (#RSAC) every [...]

How to Automate Governance, Risk and Compliance (GRC) to Reduce Costs

December 13th, 2016|Categories: Data Protection|

IT Governance, Risk Management discipline, Information Security Policy and legal compliance requirements all place a burden on companies to ensure their governance, risk and compliance [...]

Core Principles Of Building A Secure Network Architecture

November 22nd, 2016|Categories: Data Protection|

In many organisations IT projects are designed to address business objectives or as operational solutions without any thought about security. The security ‘solution’ is often [...]

Lessons from Snowden: The Unmanaged SSH Key Time Bomb

October 12th, 2016|Categories: Data Protection|

Last month Snowden (the movie) was released in the US. While the film has received mixed reviews, the story behind the movie has played out [...]

Can Your IT Systems Heal Themselves? Automation and Cyber security

September 22nd, 2016|Categories: Data Protection|

The idea of self-healing networks is very attractive to any IT Director who wants to use valuable resources - IT staff and budget - [...]

Load More Posts
burningtree.co.uk