As breaches become more sophisticated, firms must train for the next war, not the last battle

Businesses hit by a cyber attack must not dwell on the past but should instead fortify their organisation for the future. Cyber-attacks are continuing to increase and evolve at an ...
Read More

Cyber-attack! Would your firm handle it better than this?

What's it like being the victim of a live cyber-attack? What should you do to protect your company from further damage? And should you pay that ransom demand? Technology of ...
Read More

Smart Cloud Security Tip

One of the biggest concerns around cloud and web usage with our customers is sensitive data loss. And data loss can happen in myriad ways. A major concern from customers is data ...
Read More

Mitigate Risks with Modern Password Recovery Systems

The ability to reset your password is an essential system requirement. With so many online services available, it’s common to have multiple user accounts for the various apps and ...
Read More

Partner Spotlight - Data Security with Okta and Netskope

When was the last time you heard about a data breach? It wouldn’t be surprising if you said “just recently” or “last week”. According to the IBM-sponsored 2017 Cost of a Data ...
Read More

Gartner Top 10 Security Projects for 2018

CISOs should focus on these ten security projects to reduce risk and make a large impact on the business. The new chief information security officer (CISO) of a global bank is ...
Read More

Positive Business Outcomes to a More Mature Approach to Cloud Security

Cloud Best Practices, Netskope Announcements Netskope just completed some interesting new research with Doug Cahill, a senior cybersecurity analyst at Enterprise Strategy Group ...
Read More

A guide to Zero Trust in today’s perimeterless world

Zero Trust is a security concept that is centred around the belief that organisations should not trust anything inside or outside its perimeter and instead must verify anything ...
Read More

Regan.com, How Ironscales helps protect you against malicious attacks

EYAL BENISHTI Business Email Compromise attacks (BECs) have been causing organisations problems for years, with the problem getting worse. The reason ...
Read More

Cloud Risk Assessment

OBJECTIVES OF THE CRA The objective of the CRA is to provide the end user with a basic “snapshot” in time that helps them to: Identify and build awareness around cloud usage ...
Read More