Our hot takes on the latest cybersecurity developments, technologies and challenges.

Check out our content below to learn more about our vendors and projects.

Back up the cloud with Barracuda

A cybersecurity tool with the same name as a ferocious, predatory tropical fish has got to mean business, right? Much like its bloodthirsty namesake, Barracuda clamps down on cyber threats with razor-sharp precision. It provides a host of solutions for email...

NEW Stealthbits Module: The Active Directory Permissions Analyzer

Stealthbits has launched a new StealthAUDIT Active Directory Permissions Analyzer Module. It provides advanced analysis and reporting on AD activity.   What’s Stealthbits? Stealthbits not only protects an organisation’s sensitive data, but the credentials used to...

The future of events: in-person versus virtual

There’s no doubt that the last two years have thrown us a curveball when it comes to organising and attending events. Since restrictions eased, we’ve slowly reintroduced in-person events to our calendar. We started small, with the Innovation and Healthcare event in...

Secure your Microsoft Office 365 Environment

Raise your hand if you use Microsoft Office 365… Now, keep it raised if you know that account takeover in Office 365 has become the largest security threat vector in the cloud. Yeah...not ideal for one of the most widely used, relied upon business tools, is it? Since...

Our new website is now live

We’ve had a makeover! New season, new look! Over the years, Core to Cloud has gotten bigger and better. It was high time our website did the same. Built from the ground up, it’s been designed with you in mind, offering a user-friendly experience and a jargon-busting...

Abnormal: the next generation of email security

You’d be pretty annoyed if you got home to find a stranger rifling through your post, reading your confidential information, and planning to steal your identity or bank details. How did they get in? What were they scheming? Why didn’t the neighbours notice them?! This...

Key areas to protect: Remote working for the future

Zapier, Google, Twitter… carving a futuristic path by closing their offices, for good! Having experienced the financial and emotional benefits to remote working, many employers are considering a more flexible future that supports a lot more freedom of movement. With...

New Mandatory Cybersecurity Requirements for Medical Devices

News just in: the 2021 NHS DSPT (Data Security and Protection Toolkit) has specified that healthcare organisations must maintain an up-to-date inventory of medical devices connected to their network. What is the DSPT? The NHS Data Security and Protection Toolkit is an...

Stealthbits and Netwrix merge

The cybersecurity titans have joined forces to create a data protection super force. What’s the lowdown on Stealthbits and Netwrix? Previously considered competitors, Stealthbits and Netrix have merged to become a data-protecting giant. By combining their expertise,...

Protecting sports fans online

Take back control with ZeroFox In our digital world, it’s no longer a question of ‘who has an online presence?’ but ‘who doesn’t?’ Almost every business uses a public online platform - be it a website, social media profile, official app or more - to interact and...

Core to Cloud passes ISO accreditation and Cyber Essentials Plus

We talk the talk and walk the walk...we’re delighted to announce that after months of work, Core to Cloud has passed ISO accreditation and Cyber Essentials Plus. OK...what does that mean? ISO Certification In a global marketplace with an ever-evolving digital...

Ransomware has got no match for this…

Ransomware attacks are no longer just broad, automated ‘spray and pray’ attacks. Nowadays, they can be human-driven, highly targeted attacks, posing an even greater cybersecurity threat to organisations. New generations of ransomware use stolen credentials that grant...

Let’s bust the PrintNightmare bug once and for all

The PrintNightmare vulnerability has been affecting Windows users for months. Despite multiple attempts at patches, problems are still persisting. Understandably, the debacle has concerned the cyber community.

Protecting credentials, protects data.

In the age of data theft, we’re very focused on building secure structures and processes around the housing in which our data is stored. What Stealthbits points out is that it’s not just about the data storage being safe… it’s about the safety and security of the...

How to protect your organisation’s attack surface

Picture the scene. You’re about to go on holiday and you’re getting ready to set off. The bags have been packed, the house has been cleaned, and your valuables have been safely stored away. All that’s left to do is lock the front door, hop in the taxi, and head to the...

Post-pandemic cybersecurity predictions

2020 irreversibly changed the global economic and social landscape, resulting in fundamental changes to how we work and the way we live. Everyone has been forced to consider the implications of these changes, reviewing their plans and resetting expectations. James...

How Does Your Organisation Respond to Cyber Security Incidents?

The importance of Incident Response Services Incident response is a critical component of an organisation’s cyber security strategy. When we refer to an ‘incident’, this means a cyber security breach that could lead to a loss of your organisation’s functions,...

Cyber Security Vendor Partners

Share This