Join this webinar, produced in partnership with Forcepoint, as a panel of experts discuss how the future will see an increased role for cloud services and what this means for the next generation of CISOs.
You need to be a big organisation to protect against every threat in-house these days. And even if you’re a big firm, you need the right people in place and access to the right advice – as well as flexible, agile cyber security infrastructure. In this Sophos’ MDR Buyers’ Guide, it'll navigates you through the choppy waters of first deciding to out-source security operations, part or whole – then actually doing it.
Office 365 has around 250 million active users globally. It dominates. Unsurprisingly it’s attracting cyber attacks. But as this report from Vectra investigates, attackers focus on account takeovers rather than email compromise to gain initial access. Identity is the biggest risk.
In this webinar, in partnership with Sophos, the experts' choice for cyber security, we look at common mistakes and how to build an effective incident response plan
Chris Allen, consultant, lecturer and researcher in organised crime, digs into the rogue state… and offers some advice on mitigating your North Korean risk
Some cynics in the cyber-security industry will tell you that your staff are your biggest risk factor, but for those same staff, their biggest risk factor is often their in-box - and a security team that expects them to be security experts...
Some cynics in the cyber-security industry will tell you that your staff are your biggest risk factor, but for those same staff, their biggest risk factor is often their in-box - and a security team that expects them to be security experts...
From the resurgence of destructive ransomware, IoT botnets, data breaches and mobile malware to sophisticated multi-vector technologies, it is clear we are witnessing a change in cyber attacks.
It is not just attack frequency that is evolving but threat and network complexity as well, and both impact upon the capacity of the enterprise to effectively mitigate the breach risk.
Many companies continue to leave themselves vulnerable to a major breach by overlooking how they manage their privileged accounts. Here, we outline best practices and provide tips on how to protect your firm from attack.