Blog

The CISO’s Guide to 2023 Spending Vigilance and Investments

Sharon Holland

The increase in ever-more complex data breaches and ransomware attacks is seeing the CISO bring the subject of the cybersecurity to the boardroom. It’s a proactive stance to provide adequate defences, rather a reactive move to counter a detected breach.

However, this all comes at a cost, and with The Economist suggesting that a global recession in 2023 is inevitable, justifying any big investments is going to be even harder.

more →

Blog

Our Virtual Wine Tasting Was a Corker!

Sharon Holland

On 13th October activereach co-hosted with Cymulate, a leader in Extended Security Posture Management (XSPM) and Gartner Cool Vendor, a virtual wine tasting and industry roundtable.

Hosted online, over 25 Infosec professionals from various industries joined us to sample fantastic wines as well as discover why CIOs and CISOs should not make cybersecurity assumptions and need to constantly re-evaluate which elements of their cybersecurity solution stack they should keep, replace, or eliminate.

more →

Blog

Simplify and Scale Zero Trust Integrations

Sharon Holland

We’ve seen major shifts in the digital landscape that have far reaching implications on organizations around the world. These include the widespread adoption of hybrid work, the accelerated migration from on-premise to cloud resources, and the exponential increase of data in the cloud.

While organizations gain many benefits from leveraging new cloud technologies, there are several challenges that arise with new ways of doing business, including the increasing complexity of an ever-expanding attack surface, the rising number of attacks targeting web and cloud apps, and protecting users, devices, and data regardless of where they reside.

more →

Blog

Grey outlook for cloud security

Sharon Holland

Gartner’s latest report, Managing Privileged Access in Cloud Infrastructure, estimates that within the next 3 years, three-quarters of security incidents in the cloud will involve mismanagement of identities, access and privilege.  This equates to a 50% increase and will make it the number one reason for cloud security failures.

As businesses move more and more data and services to the cloud, protecting cloud infrastructure is vital.

more →