Category
cybersecurity
61 pieces
-
Cloudflare Goes Quantum Safe Before Your Data Runs Out of Time
-
Post-Quantum Encryption is Here and Your Cloud Stack Isn't Ready
-
Enterprise Hosting, VPS or VMware Which is Best?
-
Cloud Computing Demands Robust Security Solutions
-
Investment Opportunities for Startups and Technologies in AI
-
A Business Continuity Cheat Sheet
-
Securing Benefits Administration to Protect Your Business Data
-
Cloud Security Challenges in the Modern Era
-
A Practical Guide to the EU AI Act
-
The growing threat of ransomware in healthcare
-
Importance of Runtime Security for Cloud Native Environments
-
How Port Scanning Strengthens Cyber Defences
-
Defending Health and Social Care from Cyber Attacks
-
CIOs and CISOs Battle Cyber Threats, Climate, Compliance
-
Is Poor Collaboration Hurting Your Team's Productivity?
-
Building a Cyber Empire with Strategies for Success
-
Three ways to protect your business from cyberattacks
-
Data Sovereignty in AI: Five Key Considerations
-
Defending Health and Social Care from Cyber Attacks
-
How is AI changing patch management?
-
Futureproofing Identity Security with AI and ML
-
The Critical Convergence of OT and IT Cybersecurity
-
Reducing LLM hallucinations with trusted data
-
Are WAAP's needed to protect cloud applications and APIs?
-
Tackling AI’s Data Sovereignty Dilemma
-
Distinguishing Real AI in Cybersecurity
-
Three Ways to Strengthen API Security
-
The importance of channel partners in driving forward Zero Trust
-
Time to Ditch Traditional Tools for Cloud Security
-
Cloud security is a shared responsibility
-
Next-Generation Ransomware Protection for the Cloud
-
What You Need to Know about NIS2
-
Three Reasons Cyberattackers Target the Cloud
-
Managing Private Content Exposure Risk in 2024
-
Tackling AI challenges in ethics, data, and collaboration
-
The evolution of the CISO
-
Building cyber resilience across the supply chain
-
Why is Cloud security failing to keep pace?
-
CIF Presents TWF – Evan Lever
-
Battle-Ready Cybersecurity: Top 4 Tactics to Empower Teams Against Cyber Attacks
Security teams don’t need to spend wildly to combat the growing danger from cyber attacks.
-
Want to improve your cybersecurity posture?
-
CIF Presents TWF - Miguel Clarke
-
Supplementing CNAPP: Why APIs and cloud apps need additional API security
For API application protection, organisations need to focus on implementing security solutions that understand how APIs are built, deployed, and exploited and how this can unnecessarily expose applications.
-
The cost of cybercrime to our emotional wellbeing
-
Why Throwing Money at Ransomware Won't Make It Disappear
-
Is CNAPP the biggest security category in history?
As more and more organisations migrate their environments to the cloud, the need for cloud native applications security has never been higher.
-
Is Cybersecurity Finally Becoming a Business Enabler?
In the current dynamic business world, the importance of cybersecurity has transformed from being a gone from being a safety and compliance requirement to an indispensable contributor to business health and success.
-
Tips to Spot Patterns & Reduce Invalid Survey Responses
-
How critical organisations can spot unseen threats much sooner
Bad actors are everywhere. In embracing deep observability, both public and private companies will ensure that when their time comes, they can react accordingly to minimise damage.
-
The Importance of Investing in EDR for SMEs
In the first 6 months of 2022, there were over 10,000 new ransomware variants discovered. No business is immune from a breach, as highlighted by the many cases making headlines today.
-
Backup Security: Protecting Business-Critical Assets from Ransomware
There is an obvious need for more robust storage and data management, as the complexity of applications and the value of data are both rising because of digital transformation.
-
The passwordless future
In terms of security, convenience, and the overall user experience, usernames and passwords don't come close to passwordless alternatives.
-
How businesses can boost security with a strong data privacy culture
Athoma strong data privacy culture is essential to enhance security posture and regulatory compliance.
-
Strategy and anticipation are key to securing against cyber threats
With technological progress comes increased security risks. Sophisticated and co-ordinated cyber groups are working every day to find potential entry points into organisations’ networks.
-
Cybersecurity stress: how to safeguard your organisation and avoid IT burnout
For organisations to improve their security, they must seek visibility of all the components that go into the software they use.
-
Improving industrial cyber defences in the cloud
t's an exciting period of change for the industry, as new technologies are woven into operations to streamline services and enhance the customer experience.
-
How Cloud Native Application Protection Reinforces Your Cybersecurity Posture
By implementing strong access controls, encrypting sensitive data, regularly monitoring and auditing cloud environments, using trusted cloud service providers, and training employees on cloud security best practices, organisations can take the necessary steps to protect their cloud-based systems and data from cyber threats.
-
How to add AI to your cybersecurity toolkit
A successful implementation of AI in cyber defense requires a solid data governance system, reimagined incident response frameworks, sufficient talent and expertise to manage the new system, and established documentation practices.
-
Cybersecurity and Cloud: A Look Back at 2022 and What to Expect in 2023
Businesses are continuously reassessing their resources and options to fill their tech stack. In this competitive digital landscape, the innovative use of technology will be something that would generate a competitive advantage for organisations.
-
Unveiling the Top 10 Cybersecurity Threats to Watch Out for in 2023
As technology advances, so do cybercriminals' methods to gain unauthorised access to sensitive information. With the increasing reliance on technology in both personal and professional settings, it is crucial to stay informed about the top cybersecurity threats to watch out for in 2023.
-
Bring Your Own Device: navigating the cybersecurity risks
This seemingly obvious point is also one of the most important. As with any business strategy, one cannot base most cybersecurity processes on a “set it and forget it” approach.