News network security

Zscaler Podcast: Cybersecurity in the Age of AI: Episode 3: Defend Forward
Brand Voice

Zscaler Podcast: Cybersecurity in the Age of AI: Episode 3: Defend...

Businesses no longer want to wait to become victims of an attack or intrusion but are looking for proactive defence models and tools to help them repel attacks and critically recover quickly when an intrusion is successful and breaches their defences.

2 min
Quest Software Podcast: Episode 3: Remote Device Management Best Practices
Brand Voice

Quest Software Podcast: Episode 3: Remote Device Management Best...

Discover the best practice your business can follow to create comprehensive, robust and agile unified endpoint management Modern Management UEM can deliver the level of security businesses need to manage their remote workforces and the devices they use.

2 min
The Barbarians in the Cloud

Beating the Barbarians in the Cloud

As the cloud continues to be an essential asset for all businesses, developing and maintaining high levels of cybersecurity is essential. As threat actors expand their capabilities and widen their targets, learn how your enterprise can repel these attacks.

14 min
Katia Gonzalez, Head of Fraud Prevention and Security at BICS

Silicon UK In Focus Podcast: How to Combat Cloud Fraud

While telco fraud is currently a prominent news story, there’s a little less chatter on the emerging threat of cloud fraud against enterprises. Learn what current challenges face your business with cloud fraud. Discover techniques to protect your business against cloud fraud.

2 min
Agents of Transformation

Agents of Transformation

AppDynamics have launched a COVID-19 edition of its global research ‘The Agents of Transformation.’ The report includes data from interviews with IT professionals - from board-level directors and CIOs, through to senior and mid-level IT management - in enterprise organizations across ten countries, including the UK. Who will transform your business as we enter the post-digital age?

10 min
Is Home Your Business’s New Threat Perimeter?

Is Home Your Business’s New Network Security Perimeter?

Post COVID-19 could see many businesses permanently using home-based working as the norm for their enterprises. With annual reports stating lax security protocols and behaviours are still the norms (nearly 40% of workers never change their passwords), Silicon UK asks how a home-based workforce can be secured.

11 min
How to identify and defend your business’s threat perimeter

Where is Your Threat Perimeter?

As business transform into agile organizations, the traditional perimeters a company could defend against attack have expanded and become less well-defined. In an age where mobile devices, the cloud and the burgeoning IoT revolution, how does security need to change to protect businesses in this new world of fluid data?

15 min

e-Crime Congress 2012

The e-Crime Congress has an established reputation for providing practical insights on how best to proactively reduce electronic risk, delivering critical information on emerging threats to IT systems and data assets, and detailing examples of best practice that can be adopted to defend against technically sophisticated and complex cyber attacks.

1 min
Advertising