Your cyber intelligence source

search

News Briefs


Expert reports

When you need a background briefing on a topic, or a more in-depth update on a particular issue that is causing you a problem, there is sure to be an SC Whitepaper to meet your needs. SC Whitepapers extend from wide-ranging overviews to in-depth analysis of specific issues of interest to cyber-security professionals. Our Whitepapers are written by authoritative acknowledged experts in their fields and range from Access to Zero days, with insider threats, ransomware, DDoS, breaches, planning, remediation, behavioural analysis, regulation (including GDPR) and updates on specific threats among topics covered. We work in cooperation with selected commercial partners, ensuring that the information provided is independent, unbiased and authoritative.

Webinars

Our Webinars are truly informative, so that you will come away knowing more about the topic than you did before, and ideally with actionable information that you can apply in your organisation. Editorially independent moderators will quiz expert presenters and panellists, as well as asking questions from listeners to tease out the answers that you need to improve your performance. Listen today, engage with the experts, ask a question, and improve your understanding of the issues that matter to you.

Upcoming

No events found.

Past

From cyber risk to cyber resilience: cutting the business risks of cyber attacks

Why organisations need to focus on resilience and recovery, not just cyber defence

Cyber attacks are now inevitable. Cybersecurity leaders and their boards have to prepare for when, not if, a breach happens.

This means shifting from a focus on defence to resilience.

In this webcast, we look at the changing cybersecurity threat, and why CISOs are moving to resilience and recovery; the role of incident response, recovery planning, and testing; and the importance of human factors in cyber resilience.

image image image

Securing Microsoft 365: it’s more than your data at risk

In this webinar, we will look at the growing threat to Microsoft 365 environments, including from configuration tampering and drift. And we will discuss how organisations can restore both data and tenant configurations after an incident, and apply proper controls and configurations across their Microsoft 365 estates.

image image
PR
image

Managing Cyber Risks Within a Modern Attack Surface

What makes an effective attack surface management strategy, and how to monitor every potential entry point and attack vector.

In this webinar, we will look at what makes an effective attack surface management strategy. Which tools and tactics work best, and what you should be doing now to best protect your organisations’ crown jewels.

image image image