Running windows server 2003 in a post-support world

Even with the imminent end of support for Windows Server 2003 (W2K3), you may still be planning to continue running W2K3 in production. But with a never-ending stream of new exploits, vulnerabilities, and zero-day malware, how can you continue to maintain control and keep those systems safe and secure?

Understanding SSL best practices

The Secure Socket Layer (SSL) protocol is under attack. In the last year, new vulnerabilities have been uncovered that allows malicious attackers to undermine security that organisations put in place to protect themselves and their end users sensitive information. SSL is a cornerstone for organisations doing business online, ensuring data confidentiality and trusted identification of websites. The good news is that there are quick and easy ways to mitigate against these new threats that have recently been identified.

Securing #GenMobile: Is your business running the risk?

Enterprise security risk is directly linked to user demographics, industry and geography. Successful security strategies must address all of these and not technology alone.

How next generation trusted identities can help transform your business

Identity is critical to today's connected enterprise, underpinning all aspects of work life, from entering the office, accessing the corporate network to verifying and approving workflows and transactions.

Best practices for application security

Increased pressure to innovate, rapidly develop new applications, and adopt new technologies is increasing the security risk to business applications and systems. It is a very real and present risk. The number of security breaches reported is escalating - between 2013 and 2014 alone attacks grew by 120% - and the threat of an attack is more pertinent today than ever before.

Uncovering security performance myths & realities with BitSight security ratings

Organizations have long struggled to find objective ways to measure and compare performance, leaving many executives to trust metrics and data points that may not be painting the clearest picture of security posture. With increased oversight from boards and regulating bodies, it's more important than ever for security teams to be able to accurately portray their strengths and weaknesses in this crucial area.


What mobile policy suits your organisation?

When should you ban personal mobile use? Is Choose your own device appropriate, or can you safely harness the cost savings of Bring Your Own Device? What about wearable technology? Is the issue the device, or the framework within which devices are used? Can security be moved to the data itself to minimise the impact of the access device? It depends what you want to protect and why. We look at the options and selection criteria.

Moving Beyond Proxies

Proxy deployments today have outlived their usefulness and practicality. They have joined a long list of legacy products, providing limited security functionality against today's advanced threats.

Safeguarding the data when going mobile

Data security - at rest, on the device, on the server, or in transit - and the access to data on the network via mobile device, and potentially "Malicious mobile apps." We focus on the challenges and practical solutions.

Can a certificate improve security?

Security is a term commonly used in today's market place, but not all security is made equal. For many organisations, and for many vendors, security can mean many different things. Over the past few years a number of well known brands and institutions have been breached despite having had a high level of assurance that their corporate security was more than good enough.

Managing workforce mobile use

As employees increasingly have mobile access to the corporate network this webinar will discuss the steps organisations can take to minimise risk among their workforce and detail what a mobile device management policy should look like and how to enforce it.

Sign up to our newsletters