Check Out All Things

Security

What You Need to Know about NIS2

The Network and Information Security (NIS) Directive was designed...

Why APIs are the new frontier in cloud security

Organisations are seeing a proliferation of APIs (Application Programming...

The evolution of the CISO

What began as a technical innovation on the hacker...

Building Trust: Uniting Developers & AppSec Teams

The relationship between developers and security teams has typically...

Why is integration in Smart Lockers important?

With careful consideration and planning, smart locker integration can be a valuable investment that can enhance operational efficiency and improve the overall experience for end-users.

Top Three Priorities for A Successful Cloud Security Strategy

While the cost of cloud security measures may appear to be high, the cost of a data breach or security incident can be far greater and more damaging.

The Importance of Investing in EDR for SMEs

In the first 6 months of 2022, there were over 10,000 new ransomware variants discovered. No business is immune from a breach, as highlighted by the many cases making headlines today.

Creating consumer peace-of-mind with all-encompassing data security

Data security and privacy is only going to move into the consumer spotlight more over the next few years. Concerns continue to grow for consumers who hand over their personal data to the businesses they interact with and purchase goods from.

Top security threats to the cloud

Cloud is an important mechanism for digital transformation. However, many companies still operate with an outdated mindset, which can cause them to make many mistakes. 

How the cloud could hold the answers to the world’s biggest questions

Considering the cloud is already doing its part to solve the huge problems of climate change and cybersecurity, its functionality holds enormous promise to contribute further and solve even more of the world’s most pressing issues. 

How can security leaders protect their data in a multi-cloud environment?

The use of multi-cloud has gained enormously in popularity in recent years, becoming an essential part of day-to-day operations for many businesses. The adoption...

Three principles for security leadership in turbulent times

When the world is in crisis, security leaders face a serious challenge. When risk levels are high, every staff member, from non-technical teams to...

How Cybercrime-as-a-Service is luring youngsters into a life of criminal activity

A new generation of hacker is here. Research by the UK’s National Crime Agency (NCA) suggests that people as young as 12 could be at...

AI Security VS AI Cybercrime – A Game of Cat and Mouse

With cybercrime continuing to rise and become ever more complex, Philip Bindley, Managing  Director of Cloud and Security at Intercity, discusses how artificial intelligence...

Tackling Cybersecurity Challenges in the Hybrid Age

Is technology changing how we work, or is work changing how we use technology? Regardless of the cause, remote and hybrid working is now the...

Subscribe to our Newsletter