Tuesday, 10th December 2019
Logo
BLOG

The state of IT security

The IT security landscape has changed over the last few years. Historically organisations focused their efforts largely around protecting against cyber attacks, focusing on how they could prevent a data breach, protect their data and systems. A large part of this approach centred on perimeter security, that is securing your network. By Scott Nicholson, director at Bridewell Consulting.

Read More

BLOG

The all new Chief Data Officer (CDO)

Digital transformation has changed the face of business, driving disruptive change and creating spiralling amounts of data in its wake. By Steve Abbott, CEO at DocAuthority.

Read More

BLOG

GDPR Compliance – Reverting to Best Practice Security

When the General Data Protection Regulation (GDPR) came into effect in May 2018, businesses from all sectors struggled to meet the deadline. According to our research announced around the same time, more than two thirds of companies were not confident of being fully compliant ahead of the GDPR deadline. By Apricorn.

Read More

BLOG

The Insider Threat: Why Employee Engagement is a Critical Element of Cybersecurity

Beth Hood is a former advisor to the government on protective security. She now runs Verosa – a leadership development consultancy specialising in employee engagement.

Read More

BLOG

Why CDPs have the edge over DMPs when it comes to ROI

When budgets shrink, spending scrutiny grows — every penny is expected to fuel the highest possible return. So it makes sense that, after the first investment standstill since 2012, marketers are increasingly adopting technologies that can optimise targeting precision and impact, none more so than the customer data platform (CDP). By Lindsay McEwan, VP and Managing Director EMEA, Tealium.

Read More

BLOG

Where does the responsibility for cloud breaches lie?

The Cloud Security Alliance (CSA) has released a survey which discusses who should be taking responsibility for breaches in the cloud. It’s a good question. The advent of Hybrid IT, among other things, has done much to destroy our traditional notions of the perimeter, with its siloed networks and fortress-like mentality. By Scott Gordon (CSSP), CMO, Pulse Secure.

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more