Transitioning from MSP to MSSP – is Now the Right Time?
Cyber-attacks today are a daily occurrence. While high-profile attacks that cripple victims’ IT systems and prevent access to critical services make headlines, the threat...
Beyond Identity Access Management: The Next Steps in Post-Perimeter Defense
The last few years have seen an increased acceptance that traditional perimeter-based defenses such as firewalls are not enough, and that attention needs to...
End-To-End and CEO Down: Why Organizations Need a “Whole Of Company”...
Author: Rick Jones, CEO, DigitalXRAID
The White House recently described the approach needed to tackle security threats to businesses and critical infrastructure as a “whole...
Mitigating Risks During Payments & Customer Transactions
Such is the intensity of the battle against cyber-threats, the legacy defenses of anti-virus and office firewalls are no longer adequate without additional support....
Common Roadblocks to Completing a SOC 2 Audit
Author: Joseph Kirkpatrick is the President of Kirkpatrick Price
A SOC 2 report helps enterprises to demonstrate they take security and privacy seriously. Enterprise leaders...
Why We Need to Prioritize Cyber Resilience
Author: Jon Fielding, Managing Director EMEA, Apricorn
Through 2020 and into 2021, cyber threats have increasingly targeted the end-user working from home, with attackers exploiting unprepared...
The Return of Shadow IT – and the Need to Remain...
By Rob Price, Senior Specialist Solutions Consultant and Global Lead for Risk & Compliance, Snow Software
Over the years, shadow IT has been a bit...
Can Businesses Trust Zero Trust?
Author: Nigel Thorpe, Technical Director at SecureAge Technology
The traditional security model assumes that everything inside the corporate boundary is safe and trusted, and...
Social engineering dangers for enterprises to be aware of
By Paul Colwell, CTO, CyberGuard Technologies
Cybercriminals are using email trickery and falsehoods to gain access to business networks and steal or compromise corporate data
Many corporate...
Top tips for remaining secure and compliant while working from home
Shitesh Sachan, White Hat Hacker and CEO of Detox Technologies.
The demand for remote working due to the COVID-19 pandemic has invariably placed renewed pressure...