Has 2020 compromised your business’ cyber security?
This year has seen a lot of disruption, and thanks to COVID-19, businesses of all shapes and sizes have faced increased financial pressures. At the same time, we have seen [...]
Debunking seven common cyber security misconceptions
The cyber security industry has grown exponentially over the past decade, with more resources being deployed to counter threats. Yet, a new cyber-attack occurs somewhere on the web every 39 [...]
Risk management: how to secure your AI and machine learning projects
Artificial intelligence (AI) and machine learning (ML) applications have multiplied significantly over the past few years. As they grow in popularity, these tools are increasingly underpinning our everyday lives in [...]
Protecting your company’s intellectual property
Data breaches are a regular feature in the news lately. More often than not, these news stories are concerned with the theft and exposure of customer information. But what about [...]
How is your business’ IT security adapting to the ‘new normal’?
For years, organisations have been trying to get to grips with cyber security and figure out how they can protect their systems and network from a breach. Because the world [...]
Application security development in the cloud
Application security describes protective measures taken at the application level to prevent data or code within the app from being stolen or hijacked. These measures can include both hardware and software, as well as processes [...]
IGA: better integration through advanced automation
The importance of Identity Governance and Administration (IGA) in managing and reducing user access risk is well documented. Yet, despite this, many organisations still rely at least partially on manual [...]
SCADA: keeping your system secure from cyber attacks
SCADA (Supervisory Control and Data Acquisition) is not a specific technology, but rather a type of application that receives operating data about a system to control and optimise it. The [...]
IAM: safeguarding organisations against rising cyber threats
Organisations increasingly recognise Identity & Access Management (IAM) as a key enabler and an essential building block for achieving effective business transformation. But what exactly is it? IAM is a [...]
Applying a zero-trust approach while working from home
By now, many companies have accepted that working from home and remote working are likely to become the new ‘normal’. But that doesn’t necessarily mean their network and systems are [...]
IGA: managing and reducing user access risks
Understanding and being able to measure risk is the first step toward reducing it. For many organisations, the most significant internal risk comes from the vast number of sensitive applications, [...]
Zero trust: enabling business continuity and security during a pandemic
From business owners and management staff to IT support and security teams, more people than ever are now working from home due to the coronavirus outbreak. As a result, many [...]
The coronavirus threat: beware of increased cyber-attacks
Across the country, parents are juggling working from home and home-schooling. Equally, companies are facing the prospect of functioning with skeleton teams and limited resources, including important IT support functions. [...]
Highlights from the 2020 RSA Conference
Last month, we attended the RSA Conference in San Francisco — like we’ve done the past few years. Although this year was a little different... The trade show was expected [...]