Blog

The CISO’s Guide to 2023 Spending Vigilance and Investments

Sharon Holland

The increase in ever-more complex data breaches and ransomware attacks is seeing the CISO bring the subject of the cybersecurity to the boardroom. It’s a proactive stance to provide adequate defences, rather a reactive move to counter a detected breach.

However, this all comes at a cost, and with The Economist suggesting that a global recession in 2023 is inevitable, justifying any big investments is going to be even harder.

more →

Blog

Why XDR Should Be on Your Roadmap for SOC Success

Fighting modern adversaries requires having a modern security operations center (SOC), especially as organizations move to the cloud. To protect their estates against tomorrow’s threats, security professionals have often turned to more data sources and adding more security monitoring tools in their operations, both in the pursuit of maximizing their attack surface visibility and reducing time to detect and respond to threats.

more →

Blog

Simplify and Scale Zero Trust Integrations

Sharon Holland

We’ve seen major shifts in the digital landscape that have far reaching implications on organizations around the world. These include the widespread adoption of hybrid work, the accelerated migration from on-premise to cloud resources, and the exponential increase of data in the cloud.

While organizations gain many benefits from leveraging new cloud technologies, there are several challenges that arise with new ways of doing business, including the increasing complexity of an ever-expanding attack surface, the rising number of attacks targeting web and cloud apps, and protecting users, devices, and data regardless of where they reside.

more →

Blog

How retailers are protecting against cyberattacks in a post pandemic marketplace

Retail is a sector that was quick to react to the pandemic; launching online stores if the retailer did not already have one, or expanding what they were offering online if they already had a store.  This included the addition of features such as curbside pick-up.  It is estimated the pandemic accelerated the shift to online retail by 5 years.

more →

Blog

Securing Microsoft 365 Environments, Users and Data

The popularity and usage of Microsoft 365 had gradually grown over the last few years, but recently this has increased significantly with the explosion in home working as a result of the pandemic.  This has led many organizations to now consider MS 365 a business-critical application.  As happens to many applications, a rise in usage leads to an increase in interest from threat actors, looking to benefit from any vulnerabilities.

more →

Blog

Micro-segmentation and the Zero Trust Model

Traditional Perimeter Methods Are Not Enough

For organisations with perimeter-based security, a breach gives malicious actors access to your entire network, enabling them to move laterally to wherever they want as soon as they breach defences.  This security model sees all applications and data equally and therefore security and access is the same for everything. 

more →