Effectively managing your post-attack comms can mean the difference between ransomware disaster or survival. Here ,Yvonne Eskenzi, founder of Ouvert Comms, offers critical advice on striking the right tone.
The UK witnessed a harrowing number of breaches in 2021, according to the National Cyber Security Council (NCSC). The hard definition between online and the real world is blurring. Here’s how to protect your business...
Our Webinars are truly informative, so that you will come away knowing more about the topic than you did before, and ideally with actionable information that you can apply in your organisation. Editorially independent moderators will quiz expert presenters and panellists, as well as asking questions from listeners to tease out the answers that you need to improve your performance. Listen today, engage with the experts, ask a question, and improve your understanding of the issues that matter to you.
Thanks to GDPR, getting DevOps teams to care about security is no longer a nice to have – it's a legal obligation. In this webinar, in partnership with comforte AG, we explore how agile environments can help developers and other DevOps professionals think about security and risk as they are focusing on the user experience and consumer benefit
As part of our Minimising the impact of a breach series with Adarma (see the podcasts here), this session looks at key decisions needed when dealing with a breach and how to limit the consequences of future ones…
Most organisations want to go beyond just modernising their IT infrastructure. Instead, they want their IT investments to underpin true digital innovation, giving them a tangible competitive edge.In this webinar, producedin partnership with comforte AG, we discuss keeping data secure and compliant.
In this webinar, we discuss how to embed security successfully into multi-cloud strategies to ensure your cloud and data are secure. The hardware security module (HSM) is a special “trusted” network computer performing a variety of cryptographic operations: key management, key exchange, encryption, etc - and is essential for every organisation.
When you need a background briefing on a topic, or a more in-depth update on a particular issue that is causing you a problem, there is sure to be an SC Whitepaper to meet your needs. SC Whitepapers extend from wide-ranging overviews to in-depth analysis of specific issues of interest to cyber-security professionals. Our Whitepapers are written by authoritative acknowledged experts in their fields and range from Access to Zero days, with insider threats, ransomware, DDoS, breaches, planning, remediation, behavioural analysis, regulation (including GDPR) and updates on specific threats among topics covered. We work in cooperation with selected commercial partners, ensuring that the information provided is independent, unbiased and authoritative.
Read this SC Media UK whitepaper, produced in partnership with Magnet Forensics, as we discuss how, why and where you can use technology to keep your employees safe and productive – and your business firing
Consultant Paul Rummery has designed this download-and-distribute guide for your non-cyber specific staff – an easy hand-out as we enter a new world or hybrid working, where discipline, BYOD and best practice may collide.
Download this SC Media UK e-book, produced in partnership with Redscan, as we outline some of the key factors to consider when planning a cloud monitoring strategy – and the steps you can take to improve your overall success.