5 signs your Wi-Fi might be hacked and 7 ways to protect it!

How to spot and prevent hacking attempts

Latest Stories

Cyber Security Top 5 critical capabilities of a detection and response platform
Top 5 critical capabilities of a detection and response platform

Key things to consider when protecting your business

Cyber Security AI = secure email?
AI = secure email?

5 ways to improve email security

Cyber Security GenAI and the CISO
GenAI and the CISO

Security best practices, threat management, security operations, tooling and privacy

Cyber Security 5 signs your Wi-Fi might be hacked and 7 ways to protect it!
5 signs your Wi-Fi might be hacked and 7 ways to protect it!

How to spot and prevent hacking attempts

Cyber Security Identity theft alert!
Identity theft alert!

SWCRC's top tips to secure your organisation

Cyber Security Wrap up of CyberSync 2024 and a look ahead to next year
Wrap up of CyberSync 2024 and a look ahead to next year

8 sponsors | 4 expert speakers | 2 days, 200 security professionals | 2 evenings = 200+ channel partners

Cyber Security Why small cracks can lead to big payouts
Why small cracks can lead to big payouts

The latest threat intelligence and actionable insights

Cyber Security How clear is your security posture and journey?
How clear is your security posture and journey?

Assess, analyse and leverage data to protect and secure infrastructure

Cyber Security Ransomware: To pay or not to pay, that is the question
Ransomware: To pay or not to pay, that is the question

Things to consider if you are a victim of a ransomware attack

Cyber Security The "why" of AI-driven security
The "why" of AI-driven security

What it can actually do for SOCs and the wider business

Cyber Security The convergence of security & fraud
The convergence of security & fraud

How traditional silos can be a threat - and how to prevent it

Cyber Security SIEM buyer's guide for the modern SOC
SIEM buyer's guide for the modern SOC

Key considerations when selecting your SIEM solution

Cyber Security Cybersecurity professional services
Cybersecurity professional services

Why distribution hold the key

Cyber Security Are you ready for NIS2?
Are you ready for NIS2?

Reduce the risks to critical infrastructure whilst maintaining customer data confidentiality

Cyber Security Get an attacker’s view into your organisation
Cyber Security Ransomware readiness for SMBs
Ransomware readiness for SMBs

Prepare for the rising threat of RaaS, initial access brokers, and credential theft

Cyber Security CyberSync 2024 | 4-5 June
CyberSync 2024 | 4-5 June

The MYREDFORT Community's own in-person networking and hospitality events to coincide with InfoSecurity Europe.

Cyber Security Meet CyberSync's expert speakers and hosts
Meet CyberSync's expert speakers and hosts

SouthWest Cyber Resilience Centre, The Hacking Games & CISOs from Apex Group & Nielsen IQ

Advanced Solutions Accelerate your generative AI development
Accelerate your generative AI development

See how you can connect custom large language models (LLMs) to enterprise data.

Modern Workplace The convergence of security & fraud
The convergence of security & fraud

Don't let a lack of communication gives fraudsters the advantage

Most Read

Advanced Solutions Forrester predictions 2023
Forrester predictions 2023

Get your free Predictions 2023 Guide.

Application Security Web Application Security:
Web Application Security:

Top Threats and 6 Defensive Methods

Cloud Computing Microsoft Teams
Microsoft Teams

The one-stop IT app

Application Security AppJacking
AppJacking

Mitigating risk from endpoint apps

Cyber Security Cloud Technology Skills Shortages
Cloud Computing 7 Cloud Cost Optimisation Best Practices
Cloud Computing Mission Possible
Mission Possible

Hunting down and stopping stealthy attackers

Modern Workplace A Modern Workplace for a modern world
A Modern Workplace for a modern world

Read about what we believe are the principle elements of a Modern Workplace

Cloud Computing Demystifying Public Cloud Compliance
Demystifying Public Cloud Compliance

Taking an All-Of-The-Above Approach to Public Cloud Compliance

Cloud Computing Cloud Cost Optimisation
Cloud Cost Optimisation

7 Best Practices for Reducing Your Cloud Bills

12 days of an Email Security Christmas
12 days of an Email Security Christmas

Over 90% of email traffic has spam, phishing, malware and other electronic threats and email remains the main source of ransomware and malware.

Cloud Computing Lean, Mean Cost-Cutting Machine
Lean, Mean Cost-Cutting Machine

Cloud Management Platform: Helping to achieve the Financial Benefits you were Promised

We’re a community that brings together those interested in business technology, the problems it solves and the vendors who provide it. In just over a year, we’ve developed a community membership of over 30,000 business leaders just like you.

All access our content for free – there are no subscription fees - and we welcome editorial contributions, feedback, requests for information on any of the subjects we publish, or those you hope could be there in the future.

Some, but not all, of our featured content is sponsored (we need to eat!), but we’ll make it clear when it is and we always maintain editorial control.

Our aim, ultimately, is to inform you of topics of interest, so you can engage with peers through our forums, or get in touch directly with those who provide solutions and services.

We hope you like our community and want to be part of what we are trying to achieve – the free flow of information without any pressure to engage and the ability to choose the frequency and type of content you receive.

Our Promise is
  • To make you aware of commercially and technologically disruptive technologies for you to form your own view
  • To bring you the latest innovations from established players, market leaders and niche technologies
  • To offer a selection of the hot topics from the technology week
  • To give you a platform to voice and share your views with peers
  • To allow you to choose your preferences – how often you wish to be contacted by us and how.
  • To be transparent.  Make it clear when our content is informative and when one of our sponsors is promoting a topic
  • We won’t employ sales teams
  • We won’t charge a subscription fee.

It’s still not perfect and we’re evolving, but hope you’ll stay for the ride!

Sam Redwood, Community Editor

Interested in what you see? Get in touch, and let's start a conversation Get in touch