Hart InterCivic and Microsoft partner for election security

Hart InterCivic and Microsoft partner for election security
Element5 Digital/Unsplash
By Alex Smith | 04 June 2021

ElectionGuard software will be incorporated into Hart’s Verity voting systems

Maureen Data Systems is securing the world of remote working

Maureen Data Systems is securing the world of remote working
By Elly Yates-Roberts | 03 June 2021

Senior cybersecurity consultant Jason Hribar shares how the firm ensures the security of remote working environments for its diverse customer base

Jason Hribar shares how the firm ensures the security of its customers working environments

Convergence and consolidation for efficient and effective security

Convergence and consolidation for efficient and effective security
Pexels/Mati Mango
By Jules Martin | 02 June 2021

Security platforms used in isolation are not enough – integration between solutions is essential to ensure the cybersecurity of businesses

Integration between solutions is essential to ensure the cybersecurity of businesses

Banyan Security integrates with Microsoft Azure Active Directory

Banyan Security integrates with Microsoft Azure Active Directory
Rawpixel.com
By Elly Yates-Roberts | 26 May 2021

Move provides users with zero-trust access controls to improve security of hybrid environments

Shifting cloud networks into hyperdrive with Barracuda

Shifting cloud networks into hyperdrive with Barracuda
By Klaus Gheri | 21 May 2021

IT professionals around the world are gaining confidence in the cloud, but organisations are facing growing constraints when it comes to cloud access

Organisations are facing growing constraints when it comes to cloud access 

Microsoft delivers new guidance to secure hybrid work environments

Microsoft delivers new guidance to secure hybrid work environments
Microsoft
By Elly Yates-Roberts | 19 May 2021

Firm aims to help businesses protect against increased rates of malware and ransomware attacks 

Rubrik launches new data security features for ransomware recovery

Rubrik launches new data security features for ransomware recovery
iStock
By Elly Yates-Roberts | 18 May 2021

Solution helps businesses assess impact of attacks and maintain business continuity

ThreatLocker webinar: the importance of a zero-trust strategy

ThreatLocker webinar: the importance of a zero-trust strategy
iStock
By Elly Yates-Roberts | 12 May 2021

18 May 2021; virtual event

Attendees can learn how to implement solutions to protect against malware and zero-day exploits

Microsoft and Darktrace partner to enhance cybersecurity

Microsoft and Darktrace partner to enhance cybersecurity
Rawpixel.com
By Elly Yates-Roberts | 10 May 2021

Collaboration provides customers with self-learning AI that detects and responds to cyber-threats

UK government signs new three-year MOU with Microsoft

UK government signs new three-year MOU with Microsoft
iStock
By Elly Yates-Roberts | 22 April 2021

Partnership aims to help the public sector benefit from cloud computing and business applications

The importance of zero-trust policies in cybersecurity

The importance of zero-trust policies in cybersecurity
iStock
By Elly Yates-Roberts | 15 April 2021

Cybercrime is one of the biggest threats facing businesses today. ThreatLocker is helping customers understand and improve their security environments and practices

ThreatLocker is helping customers understand and improve their security environments and practices
 

Awareness training is essential for modern cybersecurity, says Giacom

Awareness training is essential for modern cybersecurity, says Giacom
Pixabay/Werner Moser
By Elly Yates-Roberts | 09 April 2021

Employees need to be trained to be vigilant, cautious and suspicious of potential threats

How digital behaviours can identify consumers

How digital behaviours can identify consumers
By Mark Elliot | 09 December 2020

As financial institutions grow their digital business, distinguishing good customers from bad actors is possible by examining the applicant’s digital behaviour patterns

As digital business grows, financial institutions can effectively distinguish good customers from bad actors

What is the price of effective business security?

What is the price of effective business security?
By Martin Renkis | 04 December 2020

Digitally transforming physical security systems can improve security and reduce total cost of ownership

Digitally transforming physical security systems can improve security and reduce total cost of ownership
 

Securing applications in the public cloud

Securing applications in the public cloud
By Chris Hill | 02 December 2020

With applications being deployed faster than ever, it is important to ensure that they remain safe from attack

With applications being deployed faster than ever, it is important to ensure they remain safe from attack

Dathena launches tool to optimise data security spending

Dathena launches tool to optimise data security spending
Microsoft
By Elly Yates-Roberts | 24 November 2020

Smart License Management uses AI to assign Microsoft 365 licenses and reduce costs

Core webinar: Microsoft 365 security and compliance

Core webinar: Microsoft 365 security and compliance
Microsoft
By Elly Yates-Roberts | 12 November 2020

Speakers from Core and Microsoft will discuss features that can help users operate safely

Pexip is ensuring the security of remote working

Pexip is ensuring the security of remote working
By Nico Cormier | 05 November 2020

People have rapidly become accustomed to video meetings. But how do organisations make sure employees are secure when a mix of technologies and vendors is required?

How do firms make sure staff are secure when using a mix of technologies and vendors?

Barracuda is removing the barriers to effective security

Barracuda is removing the barriers to effective security
By Mike Goldgof | 30 October 2020

Moving to the cloud can allow businesses to become faster and more agile when adapting to a crisis

Cloud migration can help businesses become faster and more agile when adapting to a crisis

Cyber threats are becoming more sophisticated, finds Microsoft

Cyber threats are becoming more sophisticated, finds Microsoft
Pixabay/Werner Moser
By Elly Yates-Roberts | 30 September 2020

Criminals imitate trusted Covid-19 sources like the WHO to trick their victims

Theme picker