Ransomware: To pay or not to pay, that is the question

Things to consider if you are a victim of a ransomware attack

Latest Stories

Cyber Security Why small cracks can lead to big payouts
Why small cracks can lead to big payouts

The latest threat intelligence and actionable insights

Cyber Security How clear is your security posture and journey?
How clear is your security posture and journey?

Assess, analyse and leverage data to protect and secure infrastructure

Cyber Security Ransomware: To pay or not to pay, that is the question
Ransomware: To pay or not to pay, that is the question

Things to consider if you are a victim of a ransomware attack

Cyber Security The "why" of AI-driven security
The "why" of AI-driven security

What it can actually do for SOCs and the wider business

Cyber Security The convergence of security & fraud
The convergence of security & fraud

How traditional silos can be a threat - and how to prevent it

Cyber Security SIEM buyer's guide for the modern SOC
SIEM buyer's guide for the modern SOC

Key considerations when selecting your SIEM solution

Cyber Security Are you ready for NIS2?
Are you ready for NIS2?

Reduce the risks to critical infrastructure whilst maintaining customer data confidentiality

Cyber Security Get an attacker’s view into your organisation
Cyber Security Ransomware readiness for SMBs
Ransomware readiness for SMBs

Prepare for the rising threat of RaaS, initial access brokers, and credential theft

Advanced Solutions Accelerate your generative AI development
Accelerate your generative AI development

See how you can connect custom large language models (LLMs) to enterprise data.

Modern Workplace The convergence of security & fraud
The convergence of security & fraud

Don't let a lack of communication gives fraudsters the advantage

Cyber Security Humans are the weakest link in cyber security!
Humans are the weakest link in cyber security!

How to build a strategic defence against human error across your organisation

Modern Workplace Navigate the complexities of disaster recovery
Navigate the complexities of disaster recovery

Live webinar: Best practices for establishing resiliency and hear real-life examples

Cyber Security Wearing multiple hats?
Wearing multiple hats?

Here's 6 ways to become a cyber guardian!

Cyber Security The art of networking
The art of networking

Top 10 tips to get the most from networking events

Cyber Security Global Threat Intelligence Report: March 2024 Edition
Global Threat Intelligence Report: March 2024 Edition

Actionable and contextualised intelligence from Blackberry to increase your cyber resilience.

Cyber Security SMB cybersecurity tips
SMB cybersecurity tips

Monthly expert guidance from the South West Cyber Resilience Centre.

Modern Workplace Is your DevOps team boxed in?
Is your DevOps team boxed in?

How developers can successfully leverage virtualised environments.

Devices Unlock the potential of Microsoft Surface
Unlock the potential of Microsoft Surface

Three ways to save time and costs - and maximise productivity.

Cyber Security Six security trends to watch for in 2024
Six security trends to watch for in 2024

Build and deploy security solutions to fit your business.

Most Read

Advanced Solutions Forrester predictions 2023
Forrester predictions 2023

Get your free Predictions 2023 Guide.

Application Security Web Application Security:
Web Application Security:

Top Threats and 6 Defensive Methods

Cloud Computing Microsoft Teams
Microsoft Teams

The one-stop IT app

Application Security AppJacking
AppJacking

Mitigating risk from endpoint apps

Cyber Security Cloud Technology Skills Shortages
Cloud Computing 7 Cloud Cost Optimisation Best Practices
Cloud Computing Mission Possible
Mission Possible

Hunting down and stopping stealthy attackers

Modern Workplace A Modern Workplace for a modern world
A Modern Workplace for a modern world

Read about what we believe are the principle elements of a Modern Workplace

Cloud Computing Demystifying Public Cloud Compliance
Demystifying Public Cloud Compliance

Taking an All-Of-The-Above Approach to Public Cloud Compliance

Cloud Computing Cloud Cost Optimisation
Cloud Cost Optimisation

7 Best Practices for Reducing Your Cloud Bills

12 days of an Email Security Christmas
12 days of an Email Security Christmas

Over 90% of email traffic has spam, phishing, malware and other electronic threats and email remains the main source of ransomware and malware.

Cloud Computing Lean, Mean Cost-Cutting Machine
Lean, Mean Cost-Cutting Machine

Cloud Management Platform: Helping to achieve the Financial Benefits you were Promised

We’re a community that brings together those interested in business technology, the problems it solves and the vendors who provide it. In just over a year, we’ve developed a community membership of over 30,000 business leaders just like you.

All access our content for free – there are no subscription fees - and we welcome editorial contributions, feedback, requests for information on any of the subjects we publish, or those you hope could be there in the future.

Some, but not all, of our featured content is sponsored (we need to eat!), but we’ll make it clear when it is and we always maintain editorial control.

Our aim, ultimately, is to inform you of topics of interest, so you can engage with peers through our forums, or get in touch directly with those who provide solutions and services.

We hope you like our community and want to be part of what we are trying to achieve – the free flow of information without any pressure to engage and the ability to choose the frequency and type of content you receive.

Our Promise is
  • To make you aware of commercially and technologically disruptive technologies for you to form your own view
  • To bring you the latest innovations from established players, market leaders and niche technologies
  • To offer a selection of the hot topics from the technology week
  • To give you a platform to voice and share your views with peers
  • To allow you to choose your preferences – how often you wish to be contacted by us and how.
  • To be transparent.  Make it clear when our content is informative and when one of our sponsors is promoting a topic
  • We won’t employ sales teams
  • We won’t charge a subscription fee.

It’s still not perfect and we’re evolving, but hope you’ll stay for the ride!

Sam Redwood, Community Editor

Interested in what you see? Get in touch, and let's start a conversation Get in touch