Security awareness training courses, while inherently valuable to any organization’s information security strategy, need practical support to be effective. In other words, just showing employees videos or asking them to complete quizzes isn’t enough on their own – an organization must ensure they’ve acquired...
The telecoms industry has always been highly regulated. However, the introduction of 5G ushering in with it the prospect of a world of ubiquitous connectivity delivered via an explosion of internet of things (IoT) devices is expanding the focus and burden of responsibility ever...
Around October, I had the privilege of speaking at five conferences/webinars on cloud and infrastructure security as part of cybersecurity awareness month, including one as part of the Financial Times Digital Dialogues Series. These are no doubt a reflection of how far the industry...
A holistic approach to securing your cloud solutions prevents cyber-attacks more effectively than point solutions. Are you sufficiently protected?
With the rise of ransomware, phishing mails, vishing (voice phishing), DDoS attacks, data breaches, nation state sponsored cyber-attacks, it is becoming more important than ever before...
As companies migrate and expand their applications and services to multi-cloud environments, security teams face growing challenges, ranging from corporate policies and budget constraints to compliance fines and new threats; threats to cloud data security can come from many areas, both internal and external,...