Latest Stories
Where does your security start and end?
Where does your security start and end?

How to protect data regardless of where it resides.


12345 or Password1?
12345 or Password1?

Are your users' passwords any good?


How prepared are your defences?
How prepared are your defences?

Grappling with alert fatigue, tool sprawl, and limited resources?


Understanding the network detection and response landscape
Understanding the network detection and response landscape

Building a business case for NDR adoption.


The downside of VPN
The downside of VPN

And how Menlo Security turns the tables.


Ten steps to prepare for SASE adoption

The challenges of browser security
The challenges of browser security

Thousands of policies to consider, while only a few are enforced.


3 cloud security challenges you can’t ignore
3 cloud security challenges you can’t ignore

Automation, skills gaps, and public cloud concerns.


Log it like you mean it
Log it like you mean it

Best practices for security.


Closed communication ecosystems
Closed communication ecosystems

What it means to truly control access.


Secure Access Service Edge
Secure Access Service Edge

What is it, and does it make sense?


The moment when 'secure enough', isn't
The moment when 'secure enough', isn't

Why highly secret situations need more than standard cybersecurity.


Can You Keep a Secret?
Can You Keep a Secret?

Why People-Driven Mistakes Are a Serious Matter


Compliance isn’t enough:
Compliance isn’t enough:

Securing data beyond the basics.


Safeguarding against ransomware fatigue
Safeguarding against ransomware fatigue

Build robust defence against ransomware to safeguard your data.


The real risk: Accidental leaks from trusted users
The real risk: Accidental leaks from trusted users

Some of the biggest threats to your organisation’s sensitive data come from within.


Securing communications: The hidden risks
Securing communications: The hidden risks

Threats don't just come from the outside.


The hidden dangers of cyber security
The hidden dangers of cyber security

Read Aviva's take on common cyber myths through the eyes of an insurer.


How to fight social engineering and phishing
How to fight social engineering and phishing

All you need to know from acceptable use policy to cyber insurance.


Most Read
SME Thinking About SASE?

The least you should know

SMB cybersecurity tips

Monthly expert guidance from the South West Cyber Resilience Centre.

A CxO's guide to cyber security in action

Keep your organisation safe, agile, growth-ready and prepared for whatever comes next.

Is it time to replace your SIEM?

Facing high data ingestion costs, on-prem only or lacking actionable insights?

What is next-gen firewall and why does it matter?

The what, how and why of NGFWs for your organisation

Top 5 critical capabilities of a detection and response platform

Key things to consider when protecting your business

GenAI and the CISO

Security best practices, threat management, security operations, tooling and privacy

5 signs your Wi-Fi might be hacked and 7 ways to protect it!

How to spot and prevent hacking attempts

Wrap up of CyberSync 2024 and a look ahead to next year

8 sponsors | 4 expert speakers | 2 days, 200 security professionals | 2 evenings = 200+ channel partners

Identity theft alert!

SWCRC's top tips to secure your organisation

How clear is your security posture and journey?

Assess, analyse and leverage data to protect and secure infrastructure

Why small cracks can lead to big payouts

The latest threat intelligence and actionable insights

We’re a community that brings together those interested in business technology, the problems it solves and the vendors who provide it. In just over a year, we’ve developed a community membership of over 30,000 business leaders just like you.

All access our content for free – there are no subscription fees - and we welcome editorial contributions, feedback, requests for information on any of the subjects we publish, or those you hope could be there in the future.

Some, but not all, of our featured content is sponsored (we need to eat!), but we’ll make it clear when it is and we always maintain editorial control.

Our aim, ultimately, is to inform you of topics of interest, so you can engage with peers through our forums, or get in touch directly with those who provide solutions and services.

We hope you like our community and want to be part of what we are trying to achieve – the free flow of information without any pressure to engage and the ability to choose the frequency and type of content you receive.

Our Promise is
  • To make you aware of commercially and technologically disruptive technologies for you to form your own view
  • To bring you the latest innovations from established players, market leaders and niche technologies
  • To offer a selection of the hot topics from the technology week
  • To give you a platform to voice and share your views with peers
  • To allow you to choose your preferences – how often you wish to be contacted by us and how.
  • To be transparent.  Make it clear when our content is informative and when one of our sponsors is promoting a topic
  • We won’t employ sales teams
  • We won’t charge a subscription fee.

It’s still not perfect and we’re evolving, but hope you’ll stay for the ride!

Sam Redwood, Community Editor

Interested in what you see? Get in touch, and let's start a conversation Get in touch