Latest content
WEBINARS
Making detection-and-response a business priority (and how to explain the value to the board)
As part of our Minimising the impact of a breach series with Adarma (see the podcasts here), this session looks at key decisions needed when dealing with a breach and how to limit the consequences of future ones…
Most organisations want to go beyond just modernising their IT infrastructure. Instead, they want their IT investments to underpin true digital innovation, giving them a tangible competitive edge. In this webinar, produced in partnership with comforte AG, we discuss keeping data secure and compliant.
In this webinar, we discuss how to embed security successfully into multi-cloud strategies to ensure your cloud and data are secure. The hardware security module (HSM) is a special “trusted” network computer performing a variety of cryptographic operations: key management, key exchange, encryption, etc - and is essential for every organisation.
How does security fit within DevOps? Most companies are now able to produce their own software, but it is of paramount importance that the software is secure.
In this interview with Meera Rao and Adam Brown from Synopsys, we talk about the strategies for securing the software efficiently and with minimum disruption to the operations.
EXPERT REPORTS
-
- Download
Employees: the great threat – how to keep your business safe and productive
Read this SC Media UK whitepaper, produced in partnership with Magnet Forensics, as we discuss how, why and where you can use technology to keep your employees safe and productive – and your business firing
-
- Download
Consultant Paul Rummery has designed this download-and-distribute guide for your non-cyber specific staff – an easy hand-out as we enter a new world or hybrid working, where discipline, BYOD and best practice may collide.
-
- Download
Download this SC Media UK e-book, produced in partnership with Redscan, as we outline some of the key factors to consider when planning a cloud monitoring strategy – and the steps you can take to improve your overall success.
-
- Download
Securing Microsoft Office 365 in the new normal: Closing the gap between attackers and defenders
As many businesses rapidly switch to remote operations, it is no surprise that we saw an almost unanimous increase in organisations extending their use of the ubiquitous Microsoft Office 365 for collaboration. This report, in partnership with Vectra, offers advice on checking whether your confidence is well founded – or naive.
-
- Download
An error occurred trying to play the stream. Please reload the page and try again.
CloseSign up benefits
Registering with SC Media is 100% free. Join tens of thousands of cybersecurity leaders today and gain access to the latest analysis shaping the global infosec agenda.
- Weekly newsletters featuring industry-leading insight
- Access to free cyber expert webinars and videos
- Privileged viewership of special reports, such as the Annual Cyber Salary Survey and Women of Influence