People Are the Perimeter, We Need a Zero Trust Approach to Security

Data is the new oil—an observation not lost on hackers. In a world of growing interconnectivity, our most valuable digital assets—including our digital identities–have never been ...
Read More

The Benefits of Network Scanning

As a business, you’re no doubt on the lookout for a product that is both cost effective and capable of improving your cybersecurity. Empower yourself There are plenty of products ...
Read More

It Takes 5 Steps To A Cyber Incident Response Plan

The worst has happened and you’ve discovered that your organisation has been hacked. So what should you do next? TheCyber Security Breaches Survey2017, endorsed by the UK ...
Read More

GDPR Compliance and Data Processing Agreements

Any business that is subject to the EU General Data Protection Regulation (GDPR) as a Controller will need to have in place an appropriate contract with any other Controller ...
Read More