Blog

The CISO’s Guide to 2023 Spending Vigilance and Investments

Sharon Holland

The increase in ever-more complex data breaches and ransomware attacks is seeing the CISO bring the subject of the cybersecurity to the boardroom. It’s a proactive stance to provide adequate defences, rather a reactive move to counter a detected breach.

However, this all comes at a cost, and with The Economist suggesting that a global recession in 2023 is inevitable, justifying any big investments is going to be even harder.

more →

Blog

Why XDR Should Be on Your Roadmap for SOC Success

Fighting modern adversaries requires having a modern security operations center (SOC), especially as organizations move to the cloud. To protect their estates against tomorrow’s threats, security professionals have often turned to more data sources and adding more security monitoring tools in their operations, both in the pursuit of maximizing their attack surface visibility and reducing time to detect and respond to threats.

more →

Blog

Our Virtual Wine Tasting Was a Corker!

Sharon Holland

On 13th October activereach co-hosted with Cymulate, a leader in Extended Security Posture Management (XSPM) and Gartner Cool Vendor, a virtual wine tasting and industry roundtable.

Hosted online, over 25 Infosec professionals from various industries joined us to sample fantastic wines as well as discover why CIOs and CISOs should not make cybersecurity assumptions and need to constantly re-evaluate which elements of their cybersecurity solution stack they should keep, replace, or eliminate.

more →

Blog

Simplify and Scale Zero Trust Integrations

Sharon Holland

We’ve seen major shifts in the digital landscape that have far reaching implications on organizations around the world. These include the widespread adoption of hybrid work, the accelerated migration from on-premise to cloud resources, and the exponential increase of data in the cloud.

While organizations gain many benefits from leveraging new cloud technologies, there are several challenges that arise with new ways of doing business, including the increasing complexity of an ever-expanding attack surface, the rising number of attacks targeting web and cloud apps, and protecting users, devices, and data regardless of where they reside.

more →