Our Voice
Category: Our Voice
Edit this archive in archive.php
Our Voice
Exploring Cloud Security with Microsoft.
Hear from CWSI’s Client Solution Director, Paul Conaty as he interviews Microsoft Azure expert, Raymond Mulligan, on the best practices to follow when organisations are migrating to cloud
Our Voice
What is DORA?
The Digital Operational Resilience Act is a new, critical act within the EU financial regulation. It is designed to improve the cybersecurity and operational resiliency of the financial service entities primarily around the ICT area.
Our Voice
Talking NIS2 with Microsoft.
Tune into Paul Conaty, discussing with Microsoft’s Nikoleta Gamanova and Tomás Casasco, the hot topic of upcoming the NIS2 directive that will come into national law on October 17th 2024, bringing a set of common standards that will affect a minimum of 180,000 European organisations across 18 sectors.
Our Voice
How Secure is Your Data?
The average company’s data footprint keeps growing exponentially. Imagine this: people create 2.5 quintillion bytes of data and send 333.2 billion emails every single day.
Our Voice
Five Best Practices for CISO’s Adopting XDR.
Used correctly, an XDR solution can unite multiple isolate security tools and reduce the complexity that hinders fast detection and response. Here are five key best practices that make a strong case for adopting XDR.
Our Voice
Galaxy Tab S9 FE & Buds FE: Packed with all of your favourite features
Our Voice
The Glossary of a Cyber Security Operations Centre.
Here is a quick guide to some of the widely used cyber security acronyms used for security operation centres.
Our Voice
Six Cyber Threats to Watch.
As the world becomes more connected and digital, cybersecurity is becoming more complicated. Here are six cyber security trends you need to know to prevent compromise.
Our Voice
It is time to stop wondering: Here are the new iPhone 15 & Apple Watch 9 Series
Our Voice
Fairphone 5, a new standard for sustainability
Our Voice
What is Microsoft’s Extended Detection & Response (XDR)?
Our Voice
Principles of Zero Trust Security.
Our Voice
Destination X
Our Voice
Number Matching and Additional Context in Microsoft Authenticator.
Our Voice
5 Ways to Tackle the Cyber Security Skills Gap.
Our Voice

