Network Security
Public Sector Cloud Journey
As the government continues to move workloads to the cloud, many agencies are struggling to automate...
UK National Cyber Strategy: BAE Systems Response
The new UK National Cyber Strategy represents a key moment in cyber policy and ambitions. Here, we reflect...
Escape the Ransomware Maze
Ransomware is an ever-evolving form of malware designed to steal business-critical data and then sell...
Open Channels, Hidden Threats
How Communication and Social Media Tools Are Changing the Insider Risk Equation for Compliance, IT and...
Multi-Vector Protection
Educating users is an undeniably effective way to protect them from phishing and other malware, but it...
Remote Access Security checklist for every IT admin
Keep your remote workforce secure and productive. Find everything you need to ensure remote workforce...
Using MITRE ATT&CKâ„¢ in Threat Hunting and Detection
Threat hunting is the process of proactively searching for malware or attackers that reside on your network...
Zero Trust Privilege for dummies
Cyber breaches are bigger and worse than ever. Hardly a day goes by without headlines about some new...
Sophos 2022 Threat Report
Interrelated threats target an interdependent world. We believe that shifting the timescale of attack...
The State of Security within eCommerce
2020 is a year unlike any other. Among the many effects of the global pandemic is the significant increase...
Farewell ISDN. Hello All-IP.
Analogue and ISDN telephony is a thing of the past – telephony today is mostly internet-based. Voice-over-IP...
5 Reasons Why Software Security is More Critical Than Ever
Vulnerable software and applications are the leading cause of security breaches. Couple this with the...
Strengthening Critical Infrastructure Security
Advances to critical infrastructure technology is opening the door to threat actors and cyber attacks...
Cloud and Web Security Challenges in 2022
Organisations' work environments have undergone rapid but lasting changes in the face of the recent health...
Sign up for Cyber Security Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.
