IAM How can businesses secure the remote workforce?

The security awareness of workers is fundamental when it comes to driving cyber secure practices at work. The impact of …

Remote working Four key cyber security lessons from COVID: Adjusting to the new normal

The last few months have brought drastic and long-lasting changes to the business world. Indeed, for a great many people …

Artificial Intelligence Automating the fight against large scale cyber-threats during and post-pandemic

The Covid-19 pandemic continues to be an immense humanitarian crisis that is severely impacting the global economy. As organisations have …

Cloud security Evolving fears stilt the growth of cloud adoption

Fears over data loss and compliance breaches have held back UK organisations from cloud adoption according to the latest research …

Data privacy When data manipulates you

Breaches and data leaks occur with disappointing frequency, whereby millions of records fall into the wrong hands or are misused. This …

Cyber risk Adding a new layer of security to the global internet

As internet traffic continues to surge, Adam Davenport, director of interconnection strategy at GTT, explores the steps that must be …

Vulnerability Vulnerability Management Mountain: The View from the Summit

If you haven’t read the previous article in this series on vulnerability management (VM), catch up on the series with …

Risk management Security in a time of pandemic – how to remediate the top security threats...

Recently, the FBI and US Department of Homeland Security published their report on the most damaging issues around cyber security …

Remote working Security for the “new normal”

In the wake of COVID-19, businesses turned to quick-fix, yet unreliable, security solutions to mobilise remote working at speed. Now, …

Third party risk The extended enterprise ecosystem: A growing threat

The benefits of a diverse, interconnected supply chain are compelling. Agility, speed, and cost reduction all weigh on the positive …

IAM How identity can help you navigate the impending storm

In the wake of the COVID-19 crisis, organisations and their employees have had to pivot to a whole new way …

Risk management Security job number one: Risk dialog with the business

The biggest problem in information security isn’t finding attackers, it isn’t patching systems and it isn’t even stopping phishing attacks. …