Showing only posts by Guy Matthews. Show all posts.

Locking down the edge

Source

Watch this webinar to find out how Zero Trust fits into the edge security ecosystem Commissioned Edge security is a growing headache. The attack surface is expanding as more operational functions migrate out of centralized locations and into distributed sites and devices.... [...]

Locking down the edge

Source

Watch this webinar to find out how Zero Trust fits into the edge security ecosystem Sponsored Post Edge security is a growing headache. The attack surface is expanding as more operational functions migrate out of centralized locations and into distributed sites and devices.... [...]

Shielding the data that drives AI

Source

Why we need the confidence to deploy secure, compliant AI-powered applications and workloads Sponsored Feature Every organisation must prioritise the protection of mission critical data, applications and workloads or risk disaster in the face of an ever-widening threat landscape.... [...]

Cloud migration and the cyber skills shortage

Source

Protecting applications off prem demands a fresh wave of security talent Sponsored Post Shifting workloads and applications to the cloud is on every forward-thinking CIO's wish list. It is also their worst nightmare. If they get it right, they've helped to transform and modernize their organization's operations and everyone's …

Learning from real life situations

Source

How about some cyber security education that’s actually delivered by people with genuine everyday experience? Sponsored Post There's nothing much to be said in favour of cybercrime. It ruins legitimate endeavours and wrecks livelihoods. It does, though, build a sense togetherness among the people whose job is to …

Giveaways for every security professional

Source

Don’t chuck money away before you’ve checked SANS free educational content Sponsored Post Fighting cybercrime is an expensive business. If your cyber defences fail, then the cost can be measured in many ways. There's the price of repairing damaged infrastructure, retrieving lost data, and paying regulatory penalties …