Check Out All Things

cybersecurity

The growing threat of ransomware in healthcare

In the dynamic landscape of healthcare and life sciences,...

Importance of Runtime Security for Cloud Native Environments

Runtime security plays a critical role in protecting cloud-based...

How Port Scanning Strengthens Cyber Defences

In today's rapidly evolving digital landscape, the importance of...

Defending Health and Social Care from Cyber Attacks

The National Cyber Security Centre (NCSC) recently calculated that...

CIOs and CISOs Battle Cyber Threats, Climate, Compliance

CIOs and CISOs face unrelenting pressure from three massive...

Is Poor Collaboration Hurting Your Team’s Productivity?

Regardless of how many days you believe hybrid workers should spend in or out of the office and its positive or negative impact on...

Building a Cyber Empire with Strategies for Success

Join us for an enlightening episode of our show, where host Philip Blake sits down with Amelia Hewitt to explore the multifaceted journey of...

Three ways to protect your business from cyberattacks

Keeping on top of cyberattacks in this current digital age requires businesses to regularly evolve and keep their security practices up to date. Cyberattacks...

Data Sovereignty in AI: Five Key Considerations

Data is the most valuable economic asset for modern companies and their greatest resource for growth and change. Consequently, safeguarding such data and adhering...

Defending Health and Social Care from Cyber Attacks

The National Cyber Security Centre (NCSC) recently calculated that Health and Social Care is the 5th biggest sector attacked by cyber-criminals in the UK....

How is AI changing patch management?

Cyberattacks are increasing in frequency and severity. This means maintaining the security of IT systems is more critical now than ever – and doing...

Futureproofing Identity Security with AI and ML

The field of Identity Security is undergoing a technological evolution, moving from repetitive admin work to automated, more secure solutions. Gone are the days...

The Critical Convergence of OT and IT Cybersecurity

In today’s increasingly digitised world, the threat of cyberattacks involving operational technology (OT) systems is increasing, becoming more apparent and frequent. Whilst cyberattacks of...

Reducing LLM hallucinations with trusted data

Large language models (LLM) have a range of uses, but LLMs or AI hallucinations pose great risks to organisations, and can lead to mistrust...

Are WAAP’s needed to protect cloud applications and APIs?

Attacks in the cloud are on the rise, with The State of Cloud Native Security 2024 report revealing 64% of organisations reported an increase...