How financial institutions can proactively address the challenges of the new regulations.
How financial institutions can proactively address the challenges of the new regulations.
How to ensure your business is ready for mandatory DORA compliance.
How the cloud has become an extension of your attack surface, and how to secure it.
How to create a truly agile and secure M365 environment.
What you need to know about the UK's transition from analogue to digital landlines.
AI is ready for the spotlight, but data and analytics determine if it shines.
Monthly expert guidance from the South West Cyber Resilience Centre.
Keep your organisation safe, agile, growth-ready and prepared for whatever comes next.
Facing high data ingestion costs, on-prem only or lacking actionable insights?
How AI helps track risks at every layer and laying the foundation for adoption
The what, how and why of NGFWs for your organisation
Key things to consider when protecting your business
5 ways to improve email security
Security best practices, threat management, security operations, tooling and privacy
How to spot and prevent hacking attempts
SWCRC's top tips to secure your organisation
8 sponsors | 4 expert speakers | 2 days, 200 security professionals | 2 evenings = 200+ channel partners
The latest threat intelligence and actionable insights
Assess, analyse and leverage data to protect and secure infrastructure
Things to consider if you are a victim of a ransomware attack
Get your free Predictions 2023 Guide.
Top Threats and 6 Defensive Methods
The one-stop IT app
Mitigating risk from endpoint apps
Find help fast!
Hunting down and stopping stealthy attackers
Read about what we believe are the principle elements of a Modern Workplace
CIO, Shaun Mackay considers the personal protection of people in the workplace
Some think that hackers are "cool" and that their spirit of mischief and sneaking is admirable.
How you respond to the first determines if you’ll avoid the second. Crisis communications specialist Wendy May talks us through the do’s and don’ts
Despite record spending on cyber security, breaches have become commonplace.
We’re a community that brings together those interested in business technology, the problems it solves and the vendors who provide it. In just over a year, we’ve developed a community membership of over 30,000 business leaders just like you.
All access our content for free – there are no subscription fees - and we welcome editorial contributions, feedback, requests for information on any of the subjects we publish, or those you hope could be there in the future.
Some, but not all, of our featured content is sponsored (we need to eat!), but we’ll make it clear when it is and we always maintain editorial control.
Our aim, ultimately, is to inform you of topics of interest, so you can engage with peers through our forums, or get in touch directly with those who provide solutions and services.
We hope you like our community and want to be part of what we are trying to achieve – the free flow of information without any pressure to engage and the ability to choose the frequency and type of content you receive.
It’s still not perfect and we’re evolving, but hope you’ll stay for the ride!
Sam Redwood, Community Editor
Learn about our community, what you’ll find, how we’ll help and our promise to you.
Read More