"Learn How Syncplicity Enables Data Protection"


"End-point data protection is fundamentally changing. End-points have moved from desktop to mobile with BYOD, and the data protection envelope is extending beyond simple backup and recovery solutions to include continuous data availability, security, and compliance.

During this webinar learn how Syncplicity’s enterprise file sync and share solution helps extend the data protection envelope across your enterprise."
Watch Now


Once one of FBI's Most Wanted, world's most famous hacker Kevin Mitnick joins BNN Bloomberg for a look at the evolution of cyber security and what companies and governments need to know to protect themselves.


Can We Rein in the Global Cybersecurity Crisis?


The World Economic Forum has elevated cyberattacks as one of the top global risks in terms of likelihood and impact, ahead of all other types of technological, economic, political or terrorist risks. The easy availability of advanced hacking tools combined with our aging infrastructure and outdated security models is a recipe for disaster. To tackle this looming crisis, we need to rethink our approach to security and develop new strategies to protect our most critical applications and infrastructure.

"UBA Threat Models"


Varonis UBA threat models uncover security issues quickly, and give context around metadata and what’s actually happening on your file and email servers, SharePoint, and Active Directory.

Breach Detection: Why SPOTTING a Breach is More Important than STOPPING it


In the current threat landscape, most businesses now recognise that it is only a matter of time before they are breached. This shift in philosophy from the idea of preventing every intrusion to realising that intrusions will happen is an important milestone. Sadly, hackers can hide in your network for days, weeks or months without your knowledge. UK businesses, especially SMBs, need to get smarter in their approach to detecting intrusions and limiting their impact.

How Zero Trust can help protect financial services networks


Is Zero Trust really achievable given the complexity in financial service organisations, especially considering limited staff, mergers and acquisitions and compliance pressures? Join SC and ForeScout to learn how to embrace Zero Trust to: Proactively combat today’s high frequency and sophistication of cyberattack. Gain unparalleled situational awareness of malicious activity. Prevent the transfer of sensitive data and money. Simplify adherence to compliance regulations.