Artificial intelligence (AI) Prevents Sensitive Data Loss in DMS Platforms

As AI becomes an important part of the legal industry, how can it help prevent sensitive data loss in Document Management Systems (DMS) through Machine Learning?

By: Darran Clare

DSP Toolkit and the additional challenge it presents NHS organisations

Darran Clare gives his view on the “Data Security and Protection” (DSP) toolkit and the additional opportunities and challenges it presents NHS organisations.

By: Darran Clare

 

Subscribe to Our Insights

     
     
     
    Guest Blog from Peter Berry of Beacon Consultants

    In the midst of COVID-19 and with many businesses adapting to more flexible and agile environments, how do we ensure security of information and how do businesses stay safe in the new data world?

    By: Beacon Consultants

     
     
    Supply Chain Risk in a Viral World

    Impact on the global supply chain during COVID-19 has led many businesses longing for more visibility and agility. But how will they create a risk ready supply chain that diversifies supplier regions and builds more agility into the relationships?

    By: Jon Cullum

     
     
    Hackers Know Your OT Weaknesses: How to Solve the Legacy Risk

    What are the options when your high-cost and long-life devices are running legacy operating systems? Organisations without significant capital investment to replace them are facing this reality, which has not gone unnoticed by cybercriminals.

    By: Darran Clare

     
     
    Securing Xero with 2FA – Watch the Step-by-Step Video

    Sensitive data in financial applications is extremely important to keep protected. For users of Xero, there is a free opportunity to utilise 2FA to effectively add a layer of protection. Watch our step-by-step video to learn how.

    By: Darran Clare

     
     
    Are your cloud security tools telling you half the truth?

    How can SECOPS teams be expected to effectively analyse, monitor, and improve an organisation’s security posture that extends to multiple environments, without proper data visibility being sent to existing tools?

    By: Darran Clare

     
     
    Monthly Threats May 2020

    Cyber threats exposed in May 2020 include multiple vulnerabilities in Google Chrome Browser and new phishing tactics taking advantage of Google Firebase and Microsoft Sway.

    By: Daniel Morris

     
     
    Monthly Threats April 2020

    Threats and news this month include Microsoft postponing disabling basic authentication, the sectors most likely to fall for phishing attacks and fixes released for a critical vulnerability in VMware vCenter Server.

    By: Daniel Morris

     
     
    Overcome 7 MFA Security Deployment Challenges

    We discuss challenges we have seen when deploying Multi-Factor Authentication in organisations and how each of them can be assessed individually and resolved.

    By: Darran Clare

     
     
    Equipped to Detect and Prepared to Respond

    As anybody who’s ever configured and monitored a firewall, set up a SIEM programme or spent about 15 seconds in a SOC will tell you, modern security software generates a LOT of alerts and notifications.

    By: Darran Clare

     
     
    Monthly Threats March 2020

    Learn from 6 cyber threats in March. Topics this month include NCSC work from home guidance for IT administrator and Microsoft ending support of basic authentication for Office 365.

    By: Daniel Morris