Cyber Security

Everything that relies on computers and the internet needs protection from criminal use to ensure confidentiality, integrity and availability of information.

There’s no doubt there’s many cybersecurity technologies out there that provide solutions to protect methods of communication

Email (smartphones, tablets), entertainment (interactive video games, social media, apps ), transportation (navigation systems), shopping (online shopping, credit cards), medicine (medical equipment, medical records), and the list goes on.

It’s impossible to cover it all, but hope our snapshots serve as useful insights and sources of information.

Cyber Security 14 questions to assess software risk
Cyber Security 5 expert security predictions for 2024
5 security predictions for 2024

Barracuda executives give their inside take on the year ahead.

Cyber Security A cross-NIST approach to cyber security
A cross-NIST approach to cyber security

Expert ransomware market insights for 2023

Cyber Security A CxO's guide to cyber security in action
A CxO's guide to cyber security in action

Keep your organisation safe, agile, growth-ready and prepared for whatever comes next.

Cyber Security Are you ready for NIS2?
Are you ready for NIS2?

Reduce the risks to critical infrastructure whilst maintaining customer data confidentiality

Cyber Security Ready for the worst?
Are you ready with an incident response plan?

Prepare for the worst in the event of a cyber attack: Customise your incident response plan

Cyber Security Are your cyber defences built on sand?
Are your cyber defences built on sand?

How Acronis helps manage a constantly evolving threat landscape.

Cyber Security ChatGPT and the security of your business
ChatGPT and the security of your business

How can cybersecurity and IT operations leaders adjust? Find out in this live webinar

Cyber Security Continuous controls, compliance and risk mitigation
Cyber Security Cyber attacks becoming "uninsurable"
Cyber attacks becoming "uninsurable"

Zurich CEO issues warning.

Cyber Security Cyber exposures - an insurers' perspective
Cyber exposures - an insurers' perspective

An expert's view on the state of cyber risk.

CyberSync 2025 Cybersecurity professional services
CyberSync 2025 Wrap up of CyberSync 2024 and a look ahead to next year
Wrap up of CyberSync 2024

8 sponsors | 4 expert speakers | 2 days, 200 security professionals | 2 evenings = 200+ channel partners

Cyber Security SIEM buyer's guide for the modern SOC
Elastic SIEM buyer's guide for the modern SOC

Key considerations when selecting your SIEM solution

Cyber Security The "why" of AI-driven security
Elastic The "why" of AI-driven security

What it can actually do for SOCs and the wider business

Cyber Security Fortify your tech stack
Game-Changing Cybersecurity Defence Strategies

Game-changing cybersecurity defence strategies.

Cyber Security GenAI and the CISO
Generative AI’s Impact on Cybersecurity and the CISO’s Role

Security best practices, threat management, security operations, tooling and privacy

Cyber Security Get an attacker’s view into your organisation
Cyber Security Global Threat Intelligence Report: March 2024 Edition
Global Threat Intelligence Report March 2024 Edition

Actionable and contextualised intelligence from Blackberry to increase your cyber resilience.

Cyber Security How clear is your security posture and journey?
How clear is your security posture and journey?

Assess, analyse and leverage data to protect and secure infrastructure

Cyber Security Using data to justify M365 investment
How to justify your Microsoft 365 investment

Join a live webinar on 23 February to see how to use data to prove value and bolster performance.

Cyber Security The convergence of security & fraud
Human Security The Convergence of Security & Fraud

How traditional silos can be a threat - and how to prevent it

Cyber Security Improve your security posture - in 1 minute
Improve your security posture - in 1 minute

How a web application firewall helps.

Cyber Security Is it time to replace your SIEM?
Is it time to replace your SIEM?

Facing high data ingestion costs, on-prem only or lacking actionable insights?

Rate the Article

Click the link below to rate this article

Rate this article
Have you also seen...

In today’s fast-paced development environment, organisations run a significant risk they don’t incorporate security testing into their processes.

Learn about the advantages of enabling security testing as part of the QA process and discover how easily it can be done

Download Whitepaper

Share this story

Interested in what you see? Get in touch, and let's start a conversation Get in touch