Security
- Security
Right User, Right Door
Our EMEAR Advisory CISO, Duo Security’s Richard Archdeacon explains why we’ll soon be hearing a lot more about zero trust – and why new definitions seem to…
Read More
- Security
How true cybersecurity can avoid racketeering
So much of cybersecurity is being prepared for the unknown and putting policies/rules in place that kick in any time they might be needed. It’s a continual process of assessing…
Read More
- Security
From cybersecurity to cyber safety: how can we safeguard power utilities and critical infrastructure?
Cyber safety, training, bridging IT-OT gap and working together were the key takeaways from our recent event with PNDC From stability to flux – the challenges …
Read More
- Security
Security Operations Centres What Are They And Why Do We Need Them
The Cisco UKI Podcast is back again and so is Mark Jackson. Funnily enough we are talking security, this time we are discussing SOC’s (Security Operations Centres) not Socks that…
Read More
- Security
In an increasingly digital world how can power utilities avoid cyber attacks and other security breaches?
In an increasingly digital world how can power utilities avoid cyberattacks and other security breaches? Cisco’s Utilities solutions architect Andrew Longyear explains why a fresh approach to security is…
Read More
- Security
Cisco’s 2019 Threat Report: What are the 5 biggest threats to plan for?
Valentines Day. A day of celebrating romance, eating delicious chocolates, and…er…relentless cynicsm. My two favourite examples from this morning are my local locksmiths doing a ‘Buy One Get One Free’…
Read More
- Security
Networking Academy – commitment to digital skills in action
Our Introduction to Cyber Security and Cyber Security Essentials programmes are offering students at Gower College Swansea a head-start in their university studies About Cisco Networking Academy – recap…
Read More
- Security
Safer Internet Day: The Good vs. the Bad
David Bowie:“I think the potential of what the internet is going to do to society — both good and bad — is unimaginable. I think we are on the cusp of something…
Read More
- Security
Be proactive with protection: ensuring online security for young people and schools
Safer Internet Day is an ideal opportunity to reflect on how we safeguard children and schools from the growing numbers – and types – of security threats.
Read More
- Security
Business-Driven Information Security – part 3
Why security architecture should always be driven by business need Last time, I discussed the flaws and limitations of a checklist approach to security architecture, compared with SABSA’s Business…
Read More