NEWS
GDPR – Keeping a Continuous Focus on Compliance

The General Data Protection Regulation (GDPR) came into force on 25 May 2018. In the months that followed, the regulators were quiet, but businesses would have been unwise to have been lured into a false sense of security. In fact, data breach notifications were being collected and enforcement...

Read More
NEWS
It’s time for our notion of the endpoint to change

It’s no secret that IT has evolved and, as a result, so has our approach to cybersecurity. For example, focus has shifted from a purely preventative strategy to one that seeks to reduce the time to detect and mitigate a security incident. However, one thing that hasn’t received a lot of...

Read More
NEWS
How cloud and mobility are disrupting 30 years of network and security history

The internet is disrupting industries and business models, fundamentally changing the way we live and work in the process. The cloud has also ignited a wave of disruption, which when considered in conjunction with the proliferation of mobile devices, has rendered traditional network and security...

Read More
NEWS
What’s the key to secure digital transformation?

Marc Vanmaele, CEO of TrustBuilder explains how banks and financial organisations can best balance the needs of security and user experience as they evolve their IT and processes.

Read More
NEWS
Are your vendors causing business disruption or affecting performance?

In today’s interconnected digital world, there are increasingly blurred lines between an...

Read More
NEWS
HR: The new central source of truth for business IT

Businesses the world over are facing ever increasing pressure to adapt and evolve their IT...

Read More
NEWS
What bots can learn from customer service agents

Technology is one of the few things in life we expect to just work. This is especially true when it...

Read More
NEWS
Botnets and machine learning: a story of “hide and seek”

Malware authors have always been trying to update their software and evolve their techniques in...

Read More
NEWS
Five top tips for small businesses adopting encryption

Becrypt has been in the disk encryption business for more than 15 years and have carried out...

Read More
NEWS
The role of Information Assurance in managing data security

A new year is the time for lots of pledges of how things will be done differently: new targets to...

Read More
NEWS
When Mobile Security and Compliance Clash – The MDM crisis

Out of all the IT security risks we face, mobile devices are the hardest to defend from cyber...

Read More
NEWS
CloudClient – Origins of a Zero Trust Network deployment for UK Government

Whilst the concept of Zero Trust (ZT) networks is gaining broad popularity and acclaim, elements of...

Read More

Videos

Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...
Greg Jones, SVP of MSP Success at Kaseya, discussed the TruPeer initiative and its role in supporting MSPs. He also addressed SMB IT growth, AI adoption, sustainability, and the influence of Gen Y and Gen Z...
In this interview, Dave Baggett, SVP/GM Security Suite at Kaseya, discusses how MSPs can tackle rising complexity, manage vendor sprawl, and stay ahead of high-impact incidents. We explore Kaseya’s unified...

News

Marking its autonomy from TalkTalk Group, TalkTalk Business begins a new chapter as an independent managed service provider.
Genetec introduces a dedicated UK data centre for its Security Center SaaS, ensuring compliance and data sovereignty amidst growing demand.
Genetec launches UK-specific data centre for Security Center SaaS, enhancing sovereignty and compliance with Microsoft Azure.
SentinelOne introduces ClawSec, a pioneering open-source suite to safeguard AI agent deployments against modern security threats.