Blog

Filter: TOPIC
Showing results 1 to 10 of 30
  • Federations in cyber defence

    Wednesday 11 September 2019

    Strength in numbers: forming federations in cyber defence

    The cyber threat facing military forces is constantly evolving, says Chris Holt. All the more reason to bring together their Security Operations Centres through formal federation

    Cyber Security

    Blog
    Cyber Security
  • Cleared for take-off

    Thursday 10 January 2019

    Cleared for take-off

    A recent hackathon at DASA sought to blend data analytics with data security. While quite a challenge, it can be done, explains Tim Madden of BAE Systems.

    Cyber Security

    Blog
    Cyber Security
  • New York's new Cyber Security regulations

    Wednesday 04 October 2017

    New York’s new Cyber Security regulations: Will it make a difference?

    Cyber Security regulations passed in New York state could benefit both businesses and consumers.

    Cyber Security

    Blog
    Cyber Security
  • Reverse engineering

    Monday 02 October 2017

    Reverse engineering

    Discover how our cyber security experts reconstruct the components and methods of a cyber attack.

    Cyber Security

    Blog
    Cyber Security
  • Planning I need if my company is hacked

    Monday 28 August 2017

    Planning I need if my company is hacked​

    Knowing what to do in the event of an attack is about more than fixing the technology problem.

    Cyber Security

    Blog
    Cyber Security
  • Every Pinnochio needs a DPO

    Wednesday 23 August 2017

    Every Pinocchio needs a Data Protection Officer

    Getting your head round the GDPR (General Data Protection Regulation) is hard.

    Cyber Security

    Blog
    Cyber Security
  • How to detect sophisticated cyber attacks?

    Monday 22 May 2017

    How to detect sophisticated cyber attacks?

    Monitoring tools make all the difference when it comes to working out if there is an intruder on your network.

    Cyber Security

    Blog
    Cyber Security
  • Securing the Digital Identity

    Wednesday 03 May 2017

    Securing the Digital Identity

    Identity and access management (IDAM) is the process that enables the right individuals to access the right resources, at the right times, for the right reasons. It is imperative to have a good IDAM strategy.

    Cyber Security

    Blog
    Cyber Security
  • Cyber Defence United Front

    Monday 20 February 2017

    A united front is the key to effective cyber defence

    Our latest research shows a disconnect between the views of the C-suite and those of ITDMs when it comes to their organisation’s defence strategy.

    Cyber Security

    Blog
    Cyber Security
  • Cyber Defence Monitor 2017

    Thursday 09 February 2017

    Revealing the business disconnect

    New research confirms the importance that business leaders place on the cyber security of their organisations. However, it also shows an interesting disparity between the views of our C-suite respondents and those of the IT Decision Makers.

    Cyber Security

    Blog
    Cyber Security
  1. Load more