What Makes a Security Analyst Successful? Investigative Thinking
The new SANS 2021 Report: Top Skills Analysts Need to Master analyses the need for organisations to invest in improving their security operations. It identifies the skills analysts must master to...
Caught in limbo: 3 key considerations for unlocking a truly hybrid workforce
At last – Freedom day is finally here! After a year and a half wavering in and out of lockdowns, tiers, and toing and froing from offices and workspaces to home,...
How the pandemic has impacted communication service providers across different vertical markets
The COVID-19 pandemic has had a lasting impact on countries around the world. Even with the successful vaccination roll-out, regions are still moving in and out of lockdowns. As you’d expect,...
Making finance flexible: multi-lender and multi-product payment solutions as the key to kickstarting SME...
The easing of restrictions has been a welcome relief for all merchants across the UK after an unprecedented year. However, a major fallout from the pandemic is that shopping habits have...
Critical metrics that every service business needs to have readily available.
What are the key metrics driving growth in your Professional Services Organization (PSO)? What key performance indicators (KPIs) should your company be monitoring?
Getting a concise picture of what’s taking place within...
Leveraging MISP and TheHive when you create your CTI practice
Many CISOs I speak with across Europe tell me their cybersecurity teams rely on two primary open-source platforms within their security operations (SecOps). The first is a Malware Information Sharing Platform...
Eight steps leaders must take for a successful digital strategy
All businesses strive to be as efficient and profitable as possible. So, introducing systems to improve productivity – no matter what the specific size, sector or scope of the business –...
Critical Infrastructure Remains at Risk Following Ransomware Attack
Critical infrastructure has increasingly become a top target for cybercriminals. Recently, we learned of the ransomware attack against a US fuel company, Colonial Pipeline, that carries nearly half the fuel consumed...
The Pervasiveness of Data and Data-Centric Security Strategy
Regardless of what business you are in, a data security breach is an increasingly likely scenario that all businesses must mitigate. With escalating cybercrime, the widespread growth in Cloud computing, and...
From On-Campus to On-Demand: Secure Networking for the New Higher Education
Even before the COVID-19 pandemic, connectivity played an important role in university life. In recent years, it has become the norm for students to attend lectures virtually. A wealth of online...