Keen to step up your knowledge on the Network and Information Systems Directive 2.0? Tune into CWSI’s Clients Solutions Director, Paul Conaty, interviewing with Nikoleta Gamanova, Partner Strategy and GTM at Microsoft and Tomás Casasco, Data Security Go to...
The latest mobco news
What is DORA?
The Digital Operational Resilience Act is a new, critical act within the EU financial regulation. It is designed to improve the cybersecurity and operational resiliency of the financial service entities primarily around the ICT (information and communication...
How Secure is your Data?
The average company’s data footprint keeps growing exponentially. Imagine this: people create 2.5 quintillion bytes of data and send 333.2 billion emails every single day.1 And with more than 300 million people working remotely all over the world, data security...
Five Best Practices for CISO’s Adopting XDR
Extended Detection and Response, also known as XDR, has become a hype over the last few years. As research from IBM shows, 31% of organisations have adopted XDR, and of those, 76% agree that adopting XDR has strengthened their organisation’s cyber resiliency. When...
Six Cyber Treats To Watch
As the world becomes more connected, cybersecurity is becoming more complex. As an experienced cybersecurity expert, we know how challenging it can be to prioritise where to focus your efforts. Keeping up with today’s threats means securing every area of...
The Glossary of a Cyber Security Operations Centre
The technology sector has always been awash in acronyms. For reasons such as efficiency, clarity, and standardisation, that's no different in cybersecurity. To help you navigate the acronyms used for Cyber Security Operation Centres (CSOC), here's an overview of the...
Principles of Zero Trust Security
In today’s world, cyber-attacks are increasingly prevalent, with the number of such incidents continually rising. These attacks can result in significant losses of time, money, and damage to an organisation’s reputation. It is not only large companies that are...
What is Microsoft’s Extended Detection & Response (XDR)?
XDR is one of the newest solutions within endpoint security. In contrast to traditional security technologies such as Antivirus (AV) and Endpoint Detection & Response (EDR), XDR offers a holistic approach to detection and response. It encompasses endpoints,...
Data Security & Compliance In The Modern Workplace
As increasing amounts of sensitive data are stored within organisations and the number of incidents where significant amounts of data have been lost or stolen are on the rise, regulatory pressure to ensure protection continues to increase. With new threats, such as...
Why your organisation is not fully exploiting its technology stack
The ability to manage and secure work devices, wherever they are, is fundamental to any IT strategy and never more so than in today’s decentralised workplace. The evolution of device management tools from Mobile Device Management (MDM) to Enterprise Mobility...