As the year 2026 advances, organisations must evolve their cybersecurity strategies to protect identity, maintain data integrity and safeguard brand trust, says Dr Yvonne Bernard, CTO of Hornetsecurity by Proofpoint
Paul Harris, Managing Director at Pentest Limited, talks about the mindset that is needed for successful information security improvement
The upcoming Operational Resilience regulations will be taxing. But “look on their introduction as an opportunity”, says James Drake, Senior Director at Xcina Consulting Limited
One key area of security that can often be overlooked is the authentication to the laptop or the server itself. Protecting these corporate assets is an urgent issue, cautions SecurEnvoy's Michael Urgero
When maximising your security improvement efforts, look at the here and now, rather than what may lie ahead, advises Paul Harris, CEO, Pentest Ltd
As more people work remotely, the data security and privacy compliance challenges this can bring must not be overlooked, says Samad Miah, data protection consultant, Xcina Consulting
Being open to ethical disclosure is vital, states Paul Ritchie, Managing Security Consultant, Pentest Limited
Being open to ethical disclosure is vital, states Paul Ritchie, Managing Security Consultant, Pentest Limited
The current pandemic demands an extraordinary response – in which both business continuity and crisis management have key roles to play, argues Kev Brear, Director of Consulting; Technology Risk Management, at Xcina Consulting
By Kev Brear, Director of Consulting; Technology Risk Management, at Xcina Consulting
A glut of breaches across the UK is prompting many organisations to seek Cyber Essentials audit.
A term coined at SecurEnvoy, A Shearwater Group plc Company, as being absolutely critical states: ‘Identity of the user, Identity of the device and Identity of the data’. Here, CEO Steve Watts reveals why this is so when it comes to data creation, data control and management, and the art of controlling data movement
A term coined at SecurEnvoy, A Shearwater Group plc Company, as being absolutely critical states: 'Identity of the user, Identity of the device and Identity of the data'. Here, CEO Steve Watts reveals why this is so when it comes to data creation, data control and management, and the art of controlling data movement
Rob Treacey, MD, Technology Risk Management, and Antony Tuttle, Senior Consultant and QSA at Xcina Consulting, a Shearwater Group plc company, offer their insights on the latest PCI-DSS Standard developments
Properly utilised, EasyBuild gives users the ability to look beyond the daily working processes, allowing them to refine the information and use it to improve ROI
Steve Watts, CEO of SecurEnvoy, A Shearwater Group plc Company, offers his insights on how the ideal DLP solution can protect all categories of valuable data, against all manner of risky situations
In our fifth Q & A session in association with EasyBuild we take a closer look at the challenges raised by the skills shortage in the construction industry
Paul Harris, CEO, Pentest Ltd, A Shearwater Group plc company, explains the benefits that Open Source Intelligence (OSINT) can deliver in the ongoing battle against cyber attacks
By Steve Watts, CEO, SecurEnvoy Ltd, A Shearwater Group plc Company
Human-centric, context-based data security is displacing traditional data security tools, as Dr Debbie Garside, CEO, Geolang Ltd, explains here
This is the second of our Q & As with EasyBuild. The first considered some of the basic questions asked by prospective EasyBuild clients. Here, we look beyond the most common issues and focus more on management strategies.
Nigel Hawthorn, data privacy expert at McAfee, and Charlotte Gurney, marketing manager at Brookcourt Solutions, consider how cloud can be the most secure environment for business, despite increasingly sophisticated threats and growing cybercriminal interest
Charlotte Gurney, Marketing Manager, Brookcourt Solutions, opens a window on Enterprise DNS - a platform which enables a wide range of business transformation
Charlotte Gurney, Marketing Manager, Brookcourt Solutions, and Marvin Josif, from Cix Software, look at the criticality of full visibility when facing advanced persistent threats
Charlotte Gurney, Marketing Manager, Brookcourt Solutions, and Morten Gammelgard, from Bullwall, have clear advice for those who may be hit by ransomware that evades existing security solutions
Charlotte Gurney, Marketing Manager, Brookcourt Solutions, looks at the role that machine learning-based solutions can play in preventing potentially devastating consequences
Christine Jackson, partner at law firm Wright Hassall, outlines what the GDPR means for your business and the rules around storing customer data
Charlotte Gurney, Marketing Manager, Brookcourt Solutions, provides key insights on a crucial issue that challenges so many enterprises
Distributed Denial of Service (DDoS) attacks come in many flavours. Here, Charlotte Gurney, Marketing Manager, Brookcourt Solutions, considers one in particular
...going beyond technology and product.
This Network Management Masterclass series is in association with Netreo and explores how to make an I.T. workforce more efficient
Charlotte Gurney, Group Marketing manager at Brookcourt Solutions & Partner (Cix Software), outlines how organisations need to change their approach to cybersecurity to meet the SWIFT customer security programme mandate
...going beyond technology and product.
This Network Management Masterclass series is in association with Netreo. In this Masterclass they explain how to manage application performance in the hybrid cloud
Techniques in artificial intelligence (AI) and machine learning are changing our view of the world. Charlotte Gurney, group marketing manager, Brookcourt Solutions, discusses how cyber security has seen some of the widest-ranging and impacting implementations of machine learning, deep learning, natural language processing, and more
...going beyond technology and product. This Network Management Masterclass series is in association with Netreo. In this Masterclass they explain how to establish effective IT communications during a crisis
...going beyond technology and product.
This Network Management Masterclass series is in association with Netreo. In this Masterclass they consider how to create visibility in hybrid, transitional and private cloud environments
A threat intelligence feed gives insights into possible identities of hackers, the methods they use, and the networks they are targeting, says Charlotte Gurney, group marketing manager at Brookcourt Solutions
...going beyond technology and product.
This Network Management Masterclass series is in association with Netreo. In the first of this new series they consider how to address unnecessary chaos in the Network Operations Centre
...going beyond technology and product.
This Network Management Masterclass series is in association with Paessler AG. In their third and final masterclass of 2016 they explain the value of Network monitoring beyond its traditional role
...going beyond technology and product.
This Masterclass series is in association with Certes Networks. In this edition they explore the challenge of overcoming segmentation fragmentation when enabling borderless applications.
...going beyond technology and product.
...going beyond technology and product.
This Masterclass series is in association with Certes Networks. In this edition they explore the challenge of overcoming segmentation fragmentation when enabling borderless applications.
Bill Strain, CTO at iomart, describes some common sense considerations for any business looking at a data migration exercise
… going beyond technology and product. This Masterclass series is in association with Certes Networks. In this edition they consider how best to secure enterprise applications to fit with modern work-styles and threats
...going beyond technology and product. This Masterclass series is in association with Certes Networks. In this edition they introduce frictionless security: applications enabled for any user on any device without increasing risk.
...going beyond technology and product. This Network Management Masterclass series is in association with Paessler AG. In this edition they consider the role of unified network monitoring as a meta-security solution
How do you control data breaches that threat systems miss (or take too long to find)? Here, Adam Boone, chief marketing officer at Certes Networks, offers his insights
How do you best protect your systems from malware infiltration and infection? Malwarebytes offers some expert insights and advice to help ward off the attackers
...going beyond technology and product. This Network Management Masterclass series is in association with Certes. In this edition they tackle the data breach blind spot caused by the data breaches that threat systems don't detect or take too long to find…
...going beyond technology and product. This Network Management Masterclass series is in association with Paessler AG. In this edition they explain why IT professionals need to embrace Shadow IT - but on their own terms
... going beyond technology and product. This Network Management Masterclass series is in association with Certes network. In this edition they consider how to create agile and independent security for modern network infrastructures
...going beyond technology and product. This Network Management Masterclass series is in association with Paessler AG. In this edition they explain why IT professionals need to embrace Shadow IT - but on their own terms
Seeking the best way to reducing your attack surface? First, you need to understand the differences between antivirus security and anti-malware security, says internet security company Malwarebytes
How to protect applications, in the context of changing network access and a porous perimeter - Certes Networks provides the strategy
... going beyond technology and product. This Network Management Masterclass series is in association with Certes. In this edition they consider how to protect applications in the context of changing network access and a porous perimeter
... going beyond technology and product. This Network Management Masterclass series is in association with Paessler AG. In this edition they consider network monitoring in an SDN controlled network
...going beyond technology and product. This Network Management Masterclass series is in association with Paessler AG. In this edition they examine the future of networks in the context of cloud computing
... going beyond technology and product. This Network Management Masterclass series is in association with Emulex. In this Masterclass Emulex considers networking futures, focusing on the rise of SDN and the advent of 20GbE networking
... going beyond technology and product.
This Network Management Masterclass series in association with Emulex considers the achievment of software-defined networking
...going beyond technology and product. This Network Management Masterclass series is in association with Paessler AG. In this edition we consider the future of the network and its impact on network monitoring
... going beyond technology and product. This Network Management Masterclass series in association with Emulex considers the achievment of software-defined networking
A PSN-compliant mobile working solution offers tangible benefits, but it is critical to enter into the process with a robust strategy, cautions Tim Ager of Celestix
... going beyond technology and product. This Network Management Masterclass series is in association with Paessler AG. In this edition we take a look at monitoring some of the less obvious enterprise applications.
... going beyond technology and product. This Network Management Masterclass series is in association with Emulex. In this edition Emulex explores the role of hardware in our increasingly software-defined world.
Tim Ager of Celestix has been working closely with local and regional government organisations to support their transformational government objectives. Here, he offers a taster from behind the scenes
In this edition Emulex explores the network trends that are driving the need for software-defined networking.
... going beyond technology and product. This Network Management Masterclass series is in association with Paessler AG. In this edition we consider why a network monitoring system can proactively future proof both your network and the business.
While many rue what they see as the disappearance of Microsoft from the security business, Tim Ager argues the software giant has never been more committed to the cause
...going beyond technology and product. This Network Management Masterclass series is in association with Emulex. In this edition Emulex explains the emergence of the increasingly present Software-defined world
... going beyond technology and product. This Network Management Masterclass series is in association with Paessler AG. In this edition we consider monitoring in the mobile era and network monitoring for the mobile organisation.
The increasing popularity of cyber insurance policies indicates many companies feel they have lost the fight to protect their boundaries and are now looking for a new approach, says Tim Ager, Celestix
Cyber-risk insurance policies are growing in popularity with the business community, but there’s a danger that they can encourage complacency. Tim Ager offers his thoughts
...going beyond technology and product.
This Network Management Masterclass series is in association with Paessler AG. In this edition we examine how the use of analytics can help to secure the network
Tim Ager says the demise of Windows xp is no cause for lamentation - Windows 8 has so much to offer
We need to keep evolving ways in which to authenticate our trusted users, if we are to stay ahead of the game, says Tim Ager
Risk-based authentication is now making its presence felt. Tim Ager of Celestix explains why and what it is all about
As mobile device management becomes an ever greater challenge, its convergence with two-factor authentication is one significant outcome
As mobile device management becomes an ever greater challenge, its convergence with two-factor authentication is one significant outcome
In his latest masterclass, celestix CEO tim ager explains How to deploy two-factor authentication successfully in a cloud-centric architecture
Can you really increase security and reduce cost with two-factor authentication?
"Look closer to home, if you want to take the greatest steps to safeguard your organisation in 2013"
This Security Class series is in association with ActivIdentity. In this edition we examine the challenges to be met in securing mobility
As mobile technology adoption advances the problem of the security of sensitive resources within an enterprise is exacerbated. Here ActivIdentity sheds light on this devloping problem.
… going beyond technology and product. This Masterclass series is in association with ActivIdentity. In this edition we examine two online banking security myths and show that customer preference and service is at the heart of good security
... going beyond technology and product. This Network Management Masterclass series is in association with PaloAlto. In this edition we consider Intrusion Prevention in the security 2.0 infrastructure
... going beyond technology and product. This Network Management Masterclass series is in association with WatchGuard Technologies. In this edition they consider the future of security threats
...going beyond technology and product. This Network Management Masterclass series is in association with PaloAlto. In this edition we discover how Security 2.0 can extend to mobile users
Going beyond technology and product.This Network Management Masterclass series is in association with WatchGuard Technologies. In this edition they consider how to increase the security of networked applications
...going beyond technology and product. This Network Management Masterclass series is in association with Fluke Networks. In this edition we explain how to troubleshoot fibre optic cabling prior to handover
...going beyond technology and product. This Network Management Masterclass series is in association with WatchGuard Technologies. In this edition they set out the parameters of effective Data Loss Prevention
...going beyond technology and product. This Network Management Masterclass series is in association with PaloAlto. In this edition we consider the risk versus reward dimensions of Facebook and SharePoint
...going beyond technology and product. This Network Management Masterclass series is in association with Fluke Networks. In this edition we explain how to use an OTDR for certification
...going beyond technology and product. This Network Management Masterclass series is in association with PaloAlto. In this edition we ask if next generation firewalls can provide visibility and control of Enterprise 2.0
...going beyond technology and product. This Network Management Masterclass series is in association with WatchGuard Technologies. In this edition WatchGuard considers what's involved in building a global reputation defence ?
... going beyond technology and product. This Network Management Masterclass series is in association with Fluke Networks. In this edition we explain how to certify and test fibre optic cabling
...going beyond technology and product. This Network Management Masterclass series is in association with PaloAlto and exposes the shortcomings of the traditional firewall