110 total entries
Show entries.
Major surge in cyber-attacks... and how to defend against them

As the year 2026 advances, organisations must evolve their cybersecurity strategies to protect identity, maintain data integrity and safeguard brand trust, says Dr Yvonne Bernard, CTO of Hornetsecurity by Proofpoint

Information security improvement - it's all in the mindset

Paul Harris, Managing Director at Pentest Limited, talks about the mindset that is needed for successful information security improvement

Ransomware - how can changes in regulation help against this ever-evolving threat?

The upcoming Operational Resilience regulations will be taxing. But “look on their introduction as an opportunity”, says James Drake, Senior Director at Xcina Consulting Limited

Adding Multi-Factor Authentication to Windows Logon

One key area of security that can often be overlooked is the authentication to the laptop or the server itself. Protecting these corporate assets is an urgent issue, cautions SecurEnvoy's Michael Urgero

You don't have to predict the future to be more secure

When maximising your security improvement efforts, look at the here and now, rather than what may lie ahead, advises Paul Harris, CEO, Pentest Ltd

Data protection law and working from home

As more people work remotely, the data security and privacy compliance challenges this can bring must not be overlooked, says Samad Miah, data protection consultant, Xcina Consulting

OPEN-AND-SHUT CASE

Being open to ethical disclosure is vital, states Paul Ritchie, Managing Security Consultant, Pentest Limited

Open and shut case

Being open to ethical disclosure is vital, states Paul Ritchie, Managing Security Consultant, Pentest Limited

Business continuity and crisis management in the time of Covid-19

The current pandemic demands an extraordinary response – in which both business continuity and crisis management have key roles to play, argues Kev Brear, Director of Consulting; Technology Risk Management, at Xcina Consulting

Business continuity and crisis management in the time of Covid-19

By Kev Brear, Director of Consulting; Technology Risk Management, at Xcina Consulting

Battling the breaches

A glut of breaches across the UK is prompting many organisations to seek Cyber Essentials audit.

Looking ahead…

A term coined at SecurEnvoy, A Shearwater Group plc Company, as being absolutely critical states: ‘Identity of the user, Identity of the device and Identity of the data’. Here, CEO Steve Watts reveals why this is so when it comes to data creation, data control and management, and the art of controlling data movement

Looking ahead...

A term coined at SecurEnvoy, A Shearwater Group plc Company, as being absolutely critical states: 'Identity of the user, Identity of the device and Identity of the data'. Here, CEO Steve Watts reveals why this is so when it comes to data creation, data control and management, and the art of controlling data movement

Raising the Standard!

Rob Treacey, MD, Technology Risk Management, and Antony Tuttle, Senior Consultant and QSA at Xcina Consulting, a Shearwater Group plc company, offer their insights on the latest PCI-DSS Standard developments

EasyBuild Q & A

Properly utilised, EasyBuild gives users the ability to look beyond the daily working processes, allowing them to refine the information and use it to improve ROI

Understanding Data Loss Protection

Steve Watts, CEO of SecurEnvoy, A Shearwater Group plc Company, offers his insights on how the ideal DLP solution can protect all categories of valuable data, against all manner of risky situations

EasyBuild Q & A

In our fifth Q & A session in association with EasyBuild we take a closer look at the challenges raised by the skills shortage in the construction industry

Social Engineering and Red Teaming: Risks, rewards and approaches that work

Paul Harris, CEO, Pentest Ltd, A Shearwater Group plc company, explains the benefits that Open Source Intelligence (OSINT) can deliver in the ongoing battle against cyber attacks

The human touch

Human-centric, context-based data security is displacing traditional data security tools, as Dr Debbie Garside, CEO, Geolang Ltd, explains here

Q & As

This is the second of our Q & As with EasyBuild. The first considered some of the basic questions asked by prospective EasyBuild clients. Here, we look beyond the most common issues and focus more on management strategies.

Cloud adoption: a blessing, not a curse, for IT security

Nigel Hawthorn, data privacy expert at McAfee, and Charlotte Gurney, marketing manager at Brookcourt Solutions, consider how cloud can be the most secure environment for business, despite increasingly sophisticated threats and growing cybercriminal interest

An IT hierarchy of needs

Charlotte Gurney, Marketing Manager, Brookcourt Solutions, opens a window on Enterprise DNS - a platform which enables a wide range of business transformation

You can't prevent what you can't see

Charlotte Gurney, Marketing Manager, Brookcourt Solutions, and Marvin Josif, from Cix Software, look at the criticality of full visibility when facing advanced persistent threats

Can you rely on a Human Firewall as your Last Line of Defence in the fight against Ransomware?

Charlotte Gurney, Marketing Manager, Brookcourt Solutions, and Morten Gammelgard, from Bullwall, have clear advice for those who may be hit by ransomware that evades existing security solutions

How machine learning can help you monitor insider threats

Charlotte Gurney, Marketing Manager, Brookcourt Solutions, looks at the role that machine learning-based solutions can play in preventing potentially devastating consequences

Everyone's talking about GDPR - are you?

Christine Jackson, partner at law firm Wright Hassall, outlines what the GDPR means for your business and the rules around storing customer data

How to underpin security transformation with complete visibility of your attack surface

Charlotte Gurney, Marketing Manager, Brookcourt Solutions, provides key insights on a crucial issue that challenges so many enterprises

Application-Layer DDoS Attacks: Bad Things Come in Small Packages

Distributed Denial of Service (DDoS) attacks come in many flavours. Here, Charlotte Gurney, Marketing Manager, Brookcourt Solutions, considers one in particular

The Network Computing Masterclass series...

...going beyond technology and product.
This Network Management Masterclass series is in association with Netreo and explores how to make an I.T. workforce more efficient

SWIFT Customer Security Controls Compliance: An Application-Centric Approach to Cybersecurity

Charlotte Gurney, Group Marketing manager at Brookcourt Solutions & Partner (Cix Software), outlines how organisations need to change their approach to cybersecurity to meet the SWIFT customer security programme mandate

The Network Computing Masterclass series...

...going beyond technology and product.
This Network Management Masterclass series is in association with Netreo. In this Masterclass they explain how to manage application performance in the hybrid cloud

Machine Learning Applied to Cyber Security

Techniques in artificial intelligence (AI) and machine learning are changing our view of the world. Charlotte Gurney, group marketing manager, Brookcourt Solutions, discusses how cyber security has seen some of the widest-ranging and impacting implementations of machine learning, deep learning, natural language processing, and more

The Network Computing Masterclass series...

...going beyond technology and product. This Network Management Masterclass series is in association with Netreo. In this Masterclass they explain how to establish effective IT communications during a crisis

The Network Computing Masterclass series...

...going beyond technology and product.
This Network Management Masterclass series is in association with Netreo. In this Masterclass they consider how to create visibility in hybrid, transitional and private cloud environments

Keys to Effective Threat Intelligence

A threat intelligence feed gives insights into possible identities of hackers, the methods they use, and the networks they are targeting, says Charlotte Gurney, group marketing manager at Brookcourt Solutions

The Network Computing Masterclass series...

...going beyond technology and product.
This Network Management Masterclass series is in association with Netreo. In the first of this new series they consider how to address unnecessary chaos in the Network Operations Centre

The Network Computing Masterclass series with Paessler

...going beyond technology and product.
This Network Management Masterclass series is in association with Paessler AG. In their third and final masterclass of 2016 they explain the value of Network monitoring beyond its traditional role

The Network Computing Masterclass series by Certes

...going beyond technology and product.
This Masterclass series is in association with Certes Networks. In this edition they explore the challenge of overcoming segmentation fragmentation when enabling borderless applications.

The Network Computing Masterclass series with Paessler AG

...going beyond technology and product.

The Network Computing Masterclass series... (Certes)

...going beyond technology and product.
This Masterclass series is in association with Certes Networks. In this edition they explore the challenge of overcoming segmentation fragmentation when enabling borderless applications.

A natural migration

Bill Strain, CTO at iomart, describes some common sense considerations for any business looking at a data migration exercise

The Network Computing Masterclass series… (Certes)

… going beyond technology and product. This Masterclass series is in association with Certes Networks. In this edition they consider how best to secure enterprise applications to fit with modern work-styles and threats

The Network Computing Masterclass Series with Certes Networks

...going beyond technology and product. This Masterclass series is in association with Certes Networks. In this edition they introduce frictionless security: applications enabled for any user on any device without increasing risk.

The Network Computing Masterclass Series with Paessler

...going beyond technology and product. This Network Management Masterclass series is in association with Paessler AG. In this edition they consider the role of unified network monitoring as a meta-security solution

The Data Breach Blindspot

How do you control data breaches that threat systems miss (or take too long to find)? Here, Adam Boone, chief marketing officer at Certes Networks, offers his insights

Fighting back against malware

How do you best protect your systems from malware infiltration and infection? Malwarebytes offers some expert insights and advice to help ward off the attackers

The Network Computing Masterclass series... (Certes)

...going beyond technology and product. This Network Management Masterclass series is in association with Certes. In this edition they tackle the data breach blind spot caused by the data breaches that threat systems don't detect or take too long to find…

The Network Computing Masterclass series...

...going beyond technology and product. This Network Management Masterclass series is in association with Paessler AG. In this edition they explain why IT professionals need to embrace Shadow IT - but on their own terms

The Network Computing Masterclass series...

... going beyond technology and product. This Network Management Masterclass series is in association with Certes network. In this edition they consider how to create agile and independent security for modern network infrastructures

The Network Computing Masterclass series...

...going beyond technology and product. This Network Management Masterclass series is in association with Paessler AG. In this edition they explain why IT professionals need to embrace Shadow IT - but on their own terms

Understanding the differences between antivirus and anti-malware

Seeking the best way to reducing your attack surface? First, you need to understand the differences between antivirus security and anti-malware security, says internet security company Malwarebytes

Protecting applications from Firewall failure

How to protect applications, in the context of changing network access and a porous perimeter - Certes Networks provides the strategy

The Network Computing Masterclass series...

... going beyond technology and product. This Network Management Masterclass series is in association with Certes. In this edition they consider how to protect applications in the context of changing network access and a porous perimeter

The Network Computing Masterclass series...

... going beyond technology and product. This Network Management Masterclass series is in association with Paessler AG. In this edition they consider network monitoring in an SDN controlled network

The Network Computing Masterclass series...

...going beyond technology and product. This Network Management Masterclass series is in association with Paessler AG. In this edition they examine the future of networks in the context of cloud computing

The Network Computing Masterclass series...

... going beyond technology and product. This Network Management Masterclass series is in association with Emulex. In this Masterclass Emulex considers networking futures, focusing on the rise of SDN and the advent of 20GbE networking

The Network Computing Masterclass series...

... going beyond technology and product.
This Network Management Masterclass series in association with Emulex considers the achievment of software-defined networking

The Network Computing Masterclass series...

...going beyond technology and product. This Network Management Masterclass series is in association with Paessler AG. In this edition we consider the future of the network and its impact on network monitoring

The Network Computing Masterclass series...

... going beyond technology and product. This Network Management Masterclass series in association with Emulex considers the achievment of software-defined networking

PSN-compliant mobile working

A PSN-compliant mobile working solution offers tangible benefits, but it is critical to enter into the process with a robust strategy, cautions Tim Ager of Celestix

The Network Computing Masterclass series...

... going beyond technology and product. This Network Management Masterclass series is in association with Paessler AG. In this edition we take a look at monitoring some of the less obvious enterprise applications.

The Network Computing Masterclass series...

... going beyond technology and product. This Network Management Masterclass series is in association with Emulex. In this edition Emulex explores the role of hardware in our increasingly software-defined world.

In pursuit of radical change

Tim Ager of Celestix has been working closely with local and regional government organisations to support their transformational government objectives. Here, he offers a taster from behind the scenes

The Network Computing Masterclass series...

In this edition Emulex explores the network trends that are driving the need for software-defined networking.

The Network Computing Masterclass series...

... going beyond technology and product. This Network Management Masterclass series is in association with Paessler AG. In this edition we consider why a network monitoring system can proactively future proof both your network and the business.

Security? It's in Microsoft's DNA!

While many rue what they see as the disappearance of Microsoft from the security business, Tim Ager argues the software giant has never been more committed to the cause

The Network Computing Masterclass series...

...going beyond technology and product. This Network Management Masterclass series is in association with Emulex. In this edition Emulex explains the emergence of the increasingly present Software-defined world

The Network Computing Masterclass series...

... going beyond technology and product. This Network Management Masterclass series is in association with Paessler AG. In this edition we consider monitoring in the mobile era and network monitoring for the mobile organisation.

Cyber-risk insurance: right for you?

The increasing popularity of cyber insurance policies indicates many companies feel they have lost the fight to protect their boundaries and are now looking for a new approach, says Tim Ager, Celestix

Can cyber-risk insurance really keep you safe?

Cyber-risk insurance policies are growing in popularity with the business community, but there’s a danger that they can encourage complacency. Tim Ager offers his thoughts

The Network Computing Masterclass series...

...going beyond technology and product.
This Network Management Masterclass series is in association with Paessler AG. In this edition we examine how the use of analytics can help to secure the network

Why Windows 8 is so gr8!

Tim Ager says the demise of Windows xp is no cause for lamentation - Windows 8 has so much to offer

2014: Into The Unknown

We need to keep evolving ways in which to authenticate our trusted users, if we are to stay ahead of the game, says Tim Ager

Managing The Risks

Risk-based authentication is now making its presence felt. Tim Ager of Celestix explains why and what it is all about

Key factors in a mobile world

As mobile device management becomes an ever greater challenge, its convergence with two-factor authentication is one significant outcome

Key factors in a mobile world

As mobile device management becomes an ever greater challenge, its convergence with two-factor authentication is one significant outcome

Clear Thinking In A Clouded World

In his latest masterclass, celestix CEO tim ager explains How to deploy two-factor authentication successfully in a cloud-centric architecture

Embracing The Two-Factor Factor

Can you really increase security and reduce cost with two-factor authentication?

In Safe Hands

"Look closer to home, if you want to take the greatest steps to safeguard your organisation in 2013"

Security Class

This Security Class series is in association with ActivIdentity. In this edition we examine the challenges to be met in securing mobility

The Network Computing Masterclass series...

As mobile technology adoption advances the problem of the security of sensitive resources within an enterprise is exacerbated. Here ActivIdentity sheds light on this devloping problem.

The Network Computing Masterclass series…

… going beyond technology and product. This Masterclass series is in association with ActivIdentity. In this edition we examine two online banking security myths and show that customer preference and service is at the heart of good security

The Network Computing Masterclass series ...

... going beyond technology and product. This Network Management Masterclass series is in association with PaloAlto. In this edition we consider Intrusion Prevention in the security 2.0 infrastructure

The Network Computing Masterclass series...

... going beyond technology and product. This Network Management Masterclass series is in association with WatchGuard Technologies. In this edition they consider the future of security threats

The Network Computing Masterclass series

...going beyond technology and product. This Network Management Masterclass series is in association with PaloAlto. In this edition we discover how Security 2.0 can extend to mobile users

The Network Computing Masterclass series

Going beyond technology and product.This Network Management Masterclass series is in association with WatchGuard Technologies. In this edition they consider how to increase the security of networked applications

The Network Computing Masterclass series...

...going beyond technology and product. This Network Management Masterclass series is in association with Fluke Networks. In this edition we explain how to troubleshoot fibre optic cabling prior to handover

The Network Computing Masterclass series...

...going beyond technology and product. This Network Management Masterclass series is in association with WatchGuard Technologies. In this edition they set out the parameters of effective Data Loss Prevention

The Network Computing Masterclass series...

...going beyond technology and product. This Network Management Masterclass series is in association with PaloAlto. In this edition we consider the risk versus reward dimensions of Facebook and SharePoint

The Network Computing Masterclass series...

...going beyond technology and product. This Network Management Masterclass series is in association with Fluke Networks. In this edition we explain how to use an OTDR for certification

The Network Computing Masterclass series...

...going beyond technology and product. This Network Management Masterclass series is in association with PaloAlto. In this edition we ask if next generation firewalls can provide visibility and control of Enterprise 2.0

The Network Computing Masterclass series...

...going beyond technology and product. This Network Management Masterclass series is in association with WatchGuard Technologies. In this edition WatchGuard considers what's involved in building a global reputation defence ?

The Network Computing Masterclass series...

... going beyond technology and product. This Network Management Masterclass series is in association with Fluke Networks. In this edition we explain how to certify and test fibre optic cabling

The Network Computing Masterclass series...

...going beyond technology and product. This Network Management Masterclass series is in association with PaloAlto and exposes the shortcomings of the traditional firewall