Uncovering M365’s security blind spots

How to create a truly agile and secure M365 environment.

Latest Stories

Modern Workplace The impact of migrating to the cloud
The impact of migrating to the cloud

How the cloud has become an extension of your attack surface, and how to secure it.

Modern Workplace Uncovering M365’s security blind spots
Uncovering M365’s security blind spots

How to create a truly agile and secure M365 environment.

Unified Communications The end of the road for landline - or is it?
The end of the road for landline - or is it?

What you need to know about the UK's transition from analogue to digital landlines.

Advanced Solutions The future of data and analytics in the AI era
The future of data and analytics in the AI era

AI is ready for the spotlight, but data and analytics determine if it shines.

Cyber Security SMB cybersecurity tips
SMB cybersecurity tips

Monthly expert guidance from the South West Cyber Resilience Centre.

Cyber Security A CxO's guide to cyber security in action
A CxO's guide to cyber security in action

Keep your organisation safe, agile, growth-ready and prepared for whatever comes next.

Cyber Security Is it time to replace your SIEM?
Is it time to replace your SIEM?

Facing high data ingestion costs, on-prem only or lacking actionable insights?

Devices Secure your data and operations across every device
Secure your data and operations across every device

How AI helps track risks at every layer and laying the foundation for adoption

Cyber Security What is next-gen firewall and why does it matter?
What is next-gen firewall and why does it matter?

The what, how and why of NGFWs for your organisation

Cyber Security Top 5 critical capabilities of a detection and response platform
Top 5 critical capabilities of a detection and response platform

Key things to consider when protecting your business

Cyber Security AI = secure email?
AI = secure email?

5 ways to improve email security

Cyber Security GenAI and the CISO
GenAI and the CISO

Security best practices, threat management, security operations, tooling and privacy

Cyber Security 5 signs your Wi-Fi might be hacked and 7 ways to protect it!
5 signs your Wi-Fi might be hacked and 7 ways to protect it!

How to spot and prevent hacking attempts

Cyber Security Identity theft alert!
Identity theft alert!

SWCRC's top tips to secure your organisation

Cyber Security Wrap up of CyberSync 2024 and a look ahead to next year
Wrap up of CyberSync 2024 and a look ahead to next year

8 sponsors | 4 expert speakers | 2 days, 200 security professionals | 2 evenings = 200+ channel partners

Cyber Security Why small cracks can lead to big payouts
Why small cracks can lead to big payouts

The latest threat intelligence and actionable insights

Cyber Security How clear is your security posture and journey?
How clear is your security posture and journey?

Assess, analyse and leverage data to protect and secure infrastructure

Cyber Security Ransomware: To pay or not to pay, that is the question
Ransomware: To pay or not to pay, that is the question

Things to consider if you are a victim of a ransomware attack

Cyber Security The "why" of AI-driven security
The "why" of AI-driven security

What it can actually do for SOCs and the wider business

Cyber Security The convergence of security & fraud
The convergence of security & fraud

How traditional silos can be a threat - and how to prevent it

Most Read

Advanced Solutions Forrester predictions 2023
Forrester predictions 2023

Get your free Predictions 2023 Guide.

Application Security Web Application Security:
Web Application Security:

Top Threats and 6 Defensive Methods

Cloud Computing Microsoft Teams
Microsoft Teams

The one-stop IT app

Application Security AppJacking
AppJacking

Mitigating risk from endpoint apps

Cyber Security Cloud Technology Skills Shortages
Cloud Computing 7 Cloud Cost Optimisation Best Practices
Cloud Computing Mission Possible
Mission Possible

Hunting down and stopping stealthy attackers

Modern Workplace A Modern Workplace for a modern world
A Modern Workplace for a modern world

Read about what we believe are the principle elements of a Modern Workplace

Personal Protection Workplace
Personal Protection Workplace

CIO, Shaun Mackay considers the personal protection of people in the workplace

Hackers aren’t Heroes
Hackers aren’t Heroes

Some think that hackers are "cool" and that their spirit of mischief and sneaking is admirable.

Crisis or Catastrophe?
Crisis or Catastrophe?

How you respond to the first determines if you’ll avoid the second. Crisis communications specialist Wendy May talks us through the do’s and don’ts

Network security is broken
Network security is broken

Despite record spending on cyber security, breaches have become commonplace.

We’re a community that brings together those interested in business technology, the problems it solves and the vendors who provide it. In just over a year, we’ve developed a community membership of over 30,000 business leaders just like you.

All access our content for free – there are no subscription fees - and we welcome editorial contributions, feedback, requests for information on any of the subjects we publish, or those you hope could be there in the future.

Some, but not all, of our featured content is sponsored (we need to eat!), but we’ll make it clear when it is and we always maintain editorial control.

Our aim, ultimately, is to inform you of topics of interest, so you can engage with peers through our forums, or get in touch directly with those who provide solutions and services.

We hope you like our community and want to be part of what we are trying to achieve – the free flow of information without any pressure to engage and the ability to choose the frequency and type of content you receive.

Our Promise is
  • To make you aware of commercially and technologically disruptive technologies for you to form your own view
  • To bring you the latest innovations from established players, market leaders and niche technologies
  • To offer a selection of the hot topics from the technology week
  • To give you a platform to voice and share your views with peers
  • To allow you to choose your preferences – how often you wish to be contacted by us and how.
  • To be transparent.  Make it clear when our content is informative and when one of our sponsors is promoting a topic
  • We won’t employ sales teams
  • We won’t charge a subscription fee.

It’s still not perfect and we’re evolving, but hope you’ll stay for the ride!

Sam Redwood, Community Editor

Interested in what you see? Get in touch, and let's start a conversation Get in touch