Microsoft’s Cloud Solution Provider (CSP) program continues to mature and adapt to match the continuous shi...
Other content in this Stream
Deserialization issues are the newest trend in information security. They rose to fame with the infamous Java deserialization bugs, however, the issues are not just limited to one language.
We sat down with one of our pentesting team – an ex noncommissioned (NCO) officer – to get his take on how veterans can get into a career in cybersecurity.
Is your business secure in Microsoft 365? Get involved in our Microsoft 365 Security Health Check to make sure you are configured to industry best practice.
Business leaders are worried. Conversations about rising talent shortages are gaining momentum, while the speed of technological advancement is moving faster and faster.
Endpoint Detection and Response helps you protect what matters by fortifying every edge of your network with real-time autonomous protection.
Penetration testing (aka pentesting) is an offensive security exercise using manual and automated (tooling-based) techniques to design and deploy a controlled attack on an organisations assets.
Just because your workforce is distributed doesn’t mean your office is hybrid-ready. Here are some things about a hybrid office you need to know.
With an estimated 85%* of organisations expected to embrace a cloud-first principle by 2025, and with new cloud-based vulnerabilities being discovered constantly, securing your cloud environment is no
New vulnerabilities are being found constantly. A 12-month penetration test will find these once a year, but it is possible to identify and fix these bugs immediately with continuous monitoring.
Microsoft Teams Rooms is a hybrid meetings solution that combines MS Teams, with MS accredited audio and video devices designed to enhance hybrid meetings.
Cybersecurity jobs are in demand more than ever before – great news for anyone thinking of starting their career in this exciting sector.
PSTN switch off means some technologies will stop working. Here’s a list of systems that (may) currently rely on PSTN services in your business.
Thinking about coming on a course? Here we will explain exactly what is involved, why it might be of value to you, how it works in practice, what you need and most importantly, what you get out of it.
Continuous Security Testing is a new approach that enables penetration testing at scale and at much greater frequency. Thinking continuously provides a cost-effective approach to advanced testing and
Trying to find out how much bandwidth you need for your internet telephony? This article will help.
Are you looking to build an effective BYOD policy? These are the essential questions you need to ask.
Rob Jepson, Research and Innovation Lead at Claranet, unveils our brand new webinar surrounding finding vulnerabilities in your systems.
The PSTN switch off is on the horizon. Read our blog to find out what will change when it happens and how it will affect your company.
With IT security threats on the rise, now is the time to take a closer look at the specific dangers your company needs to know about.
This webinar discusses how to address security issues by automating security in a DevOps environment to obtain a better level of assurance.