Choosing the right Secure File Transfer vendor in today's heightened security & compliance landscape

Info-Tech Director of Advisory Services in Security & Risk, James McCloskey will discuss the key risk and compliance considerations that organizations can no longer overlook when moving data assets both inside, and outside the firewall.


Shared responsibility: Securing the cloud

Organisations turn to cloud precisely because it allows both flexibility and scalability. But, many still view cloud - and cloud vendors - with trepidation, pointing to security issues, such as last year's iCloud breach, which revealed nude celebrity photos and consequently dominated the headlines in 2014.

Modern threats require modern user authentication - Is it time to step up yours?

Passwords are no longer enough to keep your data safe. You know it, we know it, and the hackers certainly know it as they exploit weak or stolen passwords in more than 75 percent of all network breaches.

The Insider Threat Report - Europe. Areas of concern for 2015 and beyond

Information is the life blood of modern business - and increasingly under attack from both traditional insiders motivated by financial gain, and external hackers that compromise insider accounts for criminal purposes and nation state goals

Got a Minute? That's all it takes to understand and remediate threats.

Achieving faster response times - this is what IT Managers strive for every day. Manual information feeds, human intervention and excel dashboards can be the reason for response delays in a well-established and organized IT department. But how do you overcome these delays and minimize the time from detection to protection?

Building a sophisticated endpoint defence strategy with full security lifecycle protection

Attackers are more sophisticated than they've ever been. They're targeting our intellectual property, sensitive customer information, user information and much more.

Sign up to our newsletters