NEWS
The Magnificent Seven: How to modernise your security operations

The main issues we see arise with cybersecurity strategies seem to link to efforts that arise when businesses look to modernise these operations – they have too few people, too many security tools and too little insight on where the attacks are coming from and how they are be carried out. By...

Read More
NEWS
Network Segmentation: how to make it work for you, every day

Corporate networks have quickly become more and more complex. Change requests are regularly processed in the hundreds by IT security teams, which are then applied to company owned network devices. As a result, underlying network configuration processes increase in size and complexity, impacting...

Read More
NEWS
Deflecting DDoS – Key Tactics in the Battle Against IoT-Powered Attacks

What makes a DDoS successful? I asked myself that question at the end of August when the central bank of Spain, Banco d’Espana, was hit by a DDoS attack that took its website temporarily offline. The bank issued a statement acknowledging the attack and stating that “no damage” had been done...

Read More
NEWS
GDPR and mitigating cyber-risk

For digital businesses across all industries and markets, there are a number of risks which...

Read More
NEWS
How unguarded privileged access can turn a breach into a catastrophe

It has become increasingly accepted by many organisations that a security breach, in some form or...

Read More
NEWS
Sizing up email threats for your business

No matter the size, all organisations are at risk of being the next target of a cyber-attack....

Read More
NEWS
Setting up your endpoint protection platform

By Liviu Arsene, senior e-threat analyst at Bitdefender.

Read More
NEWS
Every move you make

Privacy in the age of the algorithm.By Robert Brown, AVP, Cognizant's Center of the Future of Work.

Read More
NEWS
A flexible approach to privacy

The ongoing impact of GDPR, by Dan Harding, Director, Sign In App.

Read More
NEWS
Combatting daily security threats within the healthcare sector

By Anthony Perridge, VP International, ThreatQuotient.

Read More

Videos

Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...
James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...
In this interview, Eric Mink, VP of AI Adoption, shares how MSPs can turn AI curiosity into structured, billable services. He explores commercialisation strategies, vertical specialisation, and building...

News

FireMon’s latest integration with Illumio merges microsegmentation and firewall policies, promoting Zero Trust implementation across hybrid environments.
MSP Finance Team's motorsport programme is expanding in 2026, offering MSPs spaces for peer-led discussions and networking.
Netskope introduces 'Netskope One Data Lineage', enhancing data tracking and compliance in the AI era.
Assured Data Protection introduces a new service enhancing cyber resilience through automated backup and device restoration solutions.