Our Voice

Passwordless Authentication: The Future of Identity Security 

Learn More
CONTACT US

Edit this archive in archive.php

Our Voice

What is the Difference Between a SIEM and a SOC?

In this blog, we explore the various differences between a CSOC and a SIEM, shedding light on the essential roles these components play within the intricate landscape of modern cybersecurity defences.

Learn More

Our Voice

Five Key Threat Actor Groups 

Discover our blog which dives into the 5 key threat actor groups, empowering organisations to recognise potential cyber threats before they materlise.

Learn More

Our Voice

Advancements Within a CSOC in 2024

Read our blog which delves into the shifting landscape of CSOC security, offering insights into upcoming trends to keep you well-prepared for the year ahead

Learn More

Our Voice

NIS2: Changes to Data Compliance

Learn the layers of data security which will be required to successfully achieve NIS2 compliance before the directives October deadline.

Learn More

Our Voice

NIS2 and Microsoft: How Can Microsoft Help With the New NIS2 Requirements

Discover how Microsoft and NIS2 go hand in hand. Learn the various ways in which Microsoft can help you prepare for the new NIS2 requirements.

Learn More

Our Voice

Breaking Barriers: Mickaella Glynn, CPO at CWSI, on Gender Equality in the Workplace

Mickaella Glynn, Chief People Officer at CWSI Group, offers invaluable insights into how organisations can foster inclusivity and empower women in leadership roles.

Learn More

Our Voice

Breaking Barriers and Fostering Inclusion: An Interview with CWSI’s CPO, Mickaella Glynn

Discover our exclusive interview with our CPO, Mickaella Glynn, who explores this year's International Women's Day theme #InspireInclusion.

Learn More

Our Voice

Zero Trust and NIS2: Is it the Answer?

Discover how adopting a Zero Trust Architecture can help you deliver on your NIS2 compliance posture.

Learn More

Our Voice

The Use of AI to Tackle Supply Chain Risk

In this blog we delve into the use of emerging technologies in Artificial Intelligence to transform your security systems.

Learn More

Our Voice

Achieving Data Security with Microsoft

Read our blog where we dive into how Microsoft Purview enables companies to govern and protect their data across multiple estates, whilst adhering to compliance regulations.

Learn More

Our Voice

Enterprise AI Adoption: What Risks to Be Aware Of

Discover the risks of enterprise AI adoption in this detailed guide from mobco. We discuss AI and data, accuracy, plagiarism and copyright plus much more.

Learn More

Our Voice

Implications of NIS2 in Europe and Beyond

To help your organisation navigate the path to NIS2 compliance, this blog sheds a light on the implications of NIS2 across the European borders.  

Learn More

Our Voice

Key Requirements for NIS2 Compliance 

Kickstart your NIS2 compliance journey, and discover five key requirements of the directive with actionable insights on how to address them.   

Learn More

Our Voice

Unleashing the Power of AI for Cyber Security.

Within this blog, we explore the synergies between cyber security and AI, delving into how AI technologies can empower IT teams to automate and augment critical aspects of cyber security operations.

Learn More

Our Voice

How to Protect your Organisation Against Evolving Phishing Attacks

Learn More

Our Voice

Business Email Compromise (BEC) Attacks

Business Email Compromise (BEC) is a devious and sophisticated scam that targets businesses and individuals who execute transfers of funds.

Learn More

Our Voice

Phishing in 2024: Five Modern Tactics

Learn More

Our Voice

Microsoft Intune Introduces MAM for Edge on Windows

Learn More

Our Voice

Security Tips to Keep Your Organisation Safe During the Holiday Season

To help you protect your business over Christmas and get the New Year off on the right foot, here are some tips to stay one step ahead of cybercriminals.    

Learn More

Our Voice

mobco Joins Microsoft’s Cyber Security Investment Programme

mobco are excited to have joined Microsoft Cyber Security Investment (CSI) programme, a programme which enables mobco to provide specific funded engagements to customers across three key areas – threat protection, data security, and the Microsoft Sentinel suite.

Learn More

Our Voice

How Can Businesses Protect Against 99% of Cyber Attacks?

There is a way to protect against 99% of these attacks, the answer is Cyber Hygiene. Cyber hygiene is the practice of following basic security principles and habits to reduce the risk of cyberattacks.

Learn More

Our Voice

Uncover Microsoft’s Digital Defence Report

Microsoft's Digital Defence Report has a unique stance and can share wider insights on how the threat landscape has evolved and discuss the shared opportunities and challenges we all face in securing a resilient online ecosystem which the world can depend on. 

Learn More

Our Voice

Exploring Cloud Security with Microsoft.

Hear from CWSI’s Client Solution Director, Paul Conaty as he interviews Microsoft Azure expert, Raymond Mulligan, on the best practices to follow when organisations are migrating to cloud

Learn More

Our Voice

Talking NIS2 with Microsoft.

Tune into Paul Conaty, discussing with Microsoft’s Nikoleta Gamanova and Tomás Casasco, the hot topic of upcoming the NIS2 directive that will come into national law on October 17th 2024, bringing a set of common standards that will affect a minimum of 180,000 European organisations across 18 sectors.

Learn More

Our Voice

The Glossary of a Cyber Security Operations Centre.

Here is a quick guide to some of the widely used cyber security acronyms used for security operation centres.

Learn More

Our Voice

What is OSINT (Open Source Intelligence)?

Learn More