How to Securely Move to the Digital by Default Services Standard - Are You Prepared?

UK Government is driving more and more of their critical transactional businesses online. This transition to a digital by default methodology is fraught with challenges and risks which are often not clearly understood.

WordPress Security Simplified — Six Easy Steps For a More Secure Website

WordPress is the most-used content management system (CMS) in the world. More than 60 million websites, or 22.9% of the internet, use WordPress for content creation. Like marketers, hackers are also aware of this prolific trend, frequently targeting WordPress vulnerabilities to attack websites en masse—often using automated tools.

Managing Risk and Protecting Information Assets: Experiences from the UK Public Sector and Healthcare Industry

While IT professionals in the UK across industries face critical security issues around privacy of sensitive customer information, BYOD and network access, those in the public sector and healthcare industries need to comply to mandatory security regulations.

Mitigating Employee Risk - Keep Hires from Starting Fires

Employees are an organization's greatest asset and greatest risk. With a single click an employee can devastate a business by transferring or damaging huge amounts of data. Finding the balance between trust and scrutiny/control represents a tremendous challenge and a huge opportunity if executed correctly. Most organizations use intense pre-hire screening background checks to ensure they are bringing in valuable talent that will benefit the organization without the propensity to do harm. Once the employee is hired they are given the "keys to the castle" to do great things for their new employer....or they could cause great damage.


Prepare for the Breach: Detect, Respond and Disrupt at the Moment of Compromise

Many organizations over invest in network security solutions—relying on traditional antivirus to secure their endpoints. Enterprises need to prepare for the inevitability of compromise by deploying emerging endpoint threat detection and response solutions to accelerate threat discovery, respond in seconds and intervene with on-going attacks.

Guidance on migration to SHA-2

Google has advised that Chrome will gradually sunset SHA-1 cryptography, which is used in the signing process of SSL certificates. Join Entrust for a complimentary webinar that discusses the impact of these changes and why you need to migrate to SHA-2 SSL certificates.

Feeling confident in today's mobile environment

Today we live in a world without boundaries, where we are always connected and therefore, always need to be secure. Mobile devices, including smartphones, laptops, and tablets connect people to their work 24 hours a day. With our increased connectedness comes increased risk.

The Impact of endpoint data growth on corporate visibility and compliance

Did you know that forty-six percent of IT knows or suspects employees are using their individual, non-IT approved cloud accounts to store corporate data?1 Moreover, sixty percent of IT pros say insufficient backup of laptops and desktops is a problem for their organisation—putting them at risk for data loss and non-compliance.2

Hiding in Plain Sight - What's Really Happening on Your Network

Palo Alto Networks invites you to join us for this exclusive webinar where we will analyze the intertwined relationship between cyber attacks and applications based on recent data collected from over 1,499 networks in Europe, the Middle East, South Africa, Russia and the Baltics.