Network Security
FCA: Invest in Operational Resilience in Preparation for Another Crowdstrike-like Incident
-
Some respondents know their current backup systems are not sufficiently robust to allow rapid recovery.
-
BCS: Testing, Governance, Development and AI Understanding Key to Avoid Another Crowdstrike Incident
-
Around two-thirds say they use a mix of different technologies, and have seen an increase in threats.
-
Perhaps you think the more security you have, the safer you'll be. But piling up on cyber solutions can actually create more risk
-
Securing Microsoft Office 365 in the new normal: Closing the gap between attackers and defenders
As many businesses rapidly switch to remote operations, it is no surprise that we saw an almost unanimous increase in organisations extending their use of the ubiquitous Microsoft Office 365 for collaboration. This report, in partnership with Vectra, offers advice on checking whether your confidence is well founded – or naive.
-
- Download
In this webinar, we discuss how to embed security successfully into multi-cloud strategies to ensure your cloud and data are secure. The hardware security module (HSM) is a special “trusted” network computer performing a variety of cryptographic operations: key management, key exchange, encryption, etc - and is essential for every organisation.
The process of signing and signatures has always been susceptible to fraud but as technology has progressed, the act of signing has become far more secure than in the past, to the point where wet signatures can be considered more risky compared to digital signatures, especially in the context of remote business.
In this long-read article, in association with Entrust, we look at why digital signatures are so paramount for security, and the connection it has with PKI.
-
You need to be a big organisation to protect against every threat in-house these days. And even if you’re a big firm, you need the right people in place and access to the right advice – as well as flexible, agile cyber security infrastructure. In this Sophos’ MDR Buyers’ Guide, it'll navigates you through the choppy waters of first deciding to out-source security operations, part or whole – then actually doing it.
-
- Download
No more items to load
Load moreAn error occurred trying to play the stream. Please reload the page and try again.
CloseSign up benefits
Registering with SC Media is 100% free. Join tens of thousands of cybersecurity leaders today and gain access to the latest analysis shaping the global infosec agenda.
- Weekly newsletters featuring industry-leading insight
- Access to free cyber expert webinars and videos
- Privileged viewership of special reports, such as the Annual Cyber Salary Survey and Women of Influence