Log it like you mean it

Best practices for security.

Latest Stories

Cyber Security 3 cloud security challenges you can’t ignore
3 cloud security challenges you can’t ignore

Automation, skills gaps, and public cloud concerns.

Cyber Security Log it like you mean it
Log it like you mean it

Best practices for security.

Advanced Solutions Closed communication ecosystems
Closed communication ecosystems

What it means to truly control access.

Cyber Security Secure Access Service Edge
Secure Access Service Edge

What is it, and does it make sense?

Advanced Solutions The moment when 'secure enough', isn't
The moment when 'secure enough', isn't

Why highly secret situations need more than standard cybersecurity.

Advanced Solutions Can You Keep a Secret?
Can You Keep a Secret?

Why People-Driven Mistakes Are a Serious Matter

Advanced Solutions Compliance isn’t enough:
Compliance isn’t enough:

Securing data beyond the basics.

Cyber Security Safeguarding against ransomware fatigue
Safeguarding against ransomware fatigue

Build robust defence against ransomware to safeguard your data.

Advanced Solutions The real risk: Accidental leaks from trusted users
The real risk: Accidental leaks from trusted users

Some of the biggest threats to your organisation’s sensitive data come from within.

Advanced Solutions Securing communications: The hidden risks
Securing communications: The hidden risks

Threats don't just come from the outside.

Data Encryption The hidden dangers of cyber security
The hidden dangers of cyber security

Read Aviva's take on common cyber myths through the eyes of an insurer.

Data Encryption How to fight social engineering and phishing
How to fight social engineering and phishing

All you need to know from acceptable use policy to cyber insurance.

Modern Workplace Secure enterprise instant communications
Secure enterprise instant communications

Protect your data in KoolSpan Trust Circles

Advanced Solutions The price of leaked words
The price of leaked words

How unsecured communication can derail reputations and market stability

Modern Workplace The privacy personality spectrum
Data Encryption Community viewpoint:
Community viewpoint:

How data security is holding British businesses back - and how to solve it.

Cyber Security Adapting to the modern security landscape
Adapting to the modern security landscape

How to make your security operations centre SOAR.

Modern Workplace Identifying the Weakest Link
Identifying the Weakest Link

Could it be you in the team working on a sensitive business project

Advanced Solutions Everyone else is the target
Everyone else is the target

Why privacy should be everyone's concern.

Cyber Security Community viewpoint: Cyber trends in 2025
Community viewpoint: Cyber trends in 2025

What's occuring, and how to adapt your defences to an evolving landscape.

Most Read

Advanced Solutions Forrester predictions 2023
Forrester predictions 2023

Get your free Predictions 2023 Guide.

Application Security Web Application Security:
Web Application Security:

Top Threats and 6 Defensive Methods

Cloud Computing Microsoft Teams
Microsoft Teams

The one-stop IT app

Application Security AppJacking
AppJacking

Mitigating risk from endpoint apps

Cyber Security Cloud Technology Skills Shortages
Cloud Computing 7 Cloud Cost Optimisation Best Practices
Cloud Computing Mission Possible
Mission Possible

Hunting down and stopping stealthy attackers

Modern Workplace A Modern Workplace for a modern world
A Modern Workplace for a modern world

Read about what we believe are the principle elements of a Modern Workplace

Personal Protection Workplace
Personal Protection Workplace

CIO, Shaun Mackay considers the personal protection of people in the workplace

Hackers aren’t Heroes
Hackers aren’t Heroes

Some think that hackers are "cool" and that their spirit of mischief and sneaking is admirable.

Crisis or Catastrophe?
Crisis or Catastrophe?

How you respond to the first determines if you’ll avoid the second. Crisis communications specialist Wendy May talks us through the do’s and don’ts

Network security is broken
Network security is broken

Despite record spending on cyber security, breaches have become commonplace.

We’re a community that brings together those interested in business technology, the problems it solves and the vendors who provide it. In just over a year, we’ve developed a community membership of over 30,000 business leaders just like you.

All access our content for free – there are no subscription fees - and we welcome editorial contributions, feedback, requests for information on any of the subjects we publish, or those you hope could be there in the future.

Some, but not all, of our featured content is sponsored (we need to eat!), but we’ll make it clear when it is and we always maintain editorial control.

Our aim, ultimately, is to inform you of topics of interest, so you can engage with peers through our forums, or get in touch directly with those who provide solutions and services.

We hope you like our community and want to be part of what we are trying to achieve – the free flow of information without any pressure to engage and the ability to choose the frequency and type of content you receive.

Our Promise is
  • To make you aware of commercially and technologically disruptive technologies for you to form your own view
  • To bring you the latest innovations from established players, market leaders and niche technologies
  • To offer a selection of the hot topics from the technology week
  • To give you a platform to voice and share your views with peers
  • To allow you to choose your preferences – how often you wish to be contacted by us and how.
  • To be transparent.  Make it clear when our content is informative and when one of our sponsors is promoting a topic
  • We won’t employ sales teams
  • We won’t charge a subscription fee.

It’s still not perfect and we’re evolving, but hope you’ll stay for the ride!

Sam Redwood, Community Editor

Interested in what you see? Get in touch, and let's start a conversation Get in touch