Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

September 2021

Encryption and authentication don't need to be painful! Here's how.

I had the pleasure of being at an in-person event recently. Aside from the joy it brought me to simply see people for the three-dimensional beings they are, it was of course incredible to connect with the Information Security community once more. Interestingly, a topic came up in quite a few of my conversations with fellow delegates. And it was one that I wasn’t expecting: encryption. It was often amiable, but on a couple of occasions eyes would roll.

Where does cybersecurity fit in 2022 budget priorities?

As tech budgets start to return to a pre-pandemic state, it will be interesting to see where priorities have shifted to over the past year and a half – especially when it comes to cybersecurity. We’ve taken a look at a few major industry reports to give you an idea of shifting plans, and where cybersecurity sits as a priority in 2022 budgets.

Outbound email: Microsoft 365's security blind spot

Microsoft 365 is the world's go-to productivity platform - but its native security technology is limited in its ability to stop outbound email data breaches. Outbound email is the leading cause of data loss across all industries and native Microsoft 365 security features aren't intelligent enough to protect you from human-activated data loss.

Healthcare organisations and the UK GDPR A four step guide to compliance

People will always make mistakes - and, unfortunately, in busy and stressful workplaces, such as hospitals and medical clinics, the likelihood of this increases. Without the right processes and technologies in place to help avoid mistakes, sensitive patient information remains at risk.