Our hot takes on the latest cybersecurity developments, technologies and challenges.

Check out our content below to learn more about our vendors and projects.

ZeroFox tackles online impersonation and fake accounts

There’s no denying that social media has been a game-changer. In a matter of years, it’s allowed us to communicate on an unprecedented scale. We can access breaking news stories within seconds, connect with anyone around the world, and conduct business from the palms...

Ironscales partners with Core to Cloud

Email threats are growing in their frequency and complexity. Every day, millions of new phishing attacks are created and sent. Due to their increasing sophistication, thousands of phishing emails are still landing in the inboxes of their desired targets, resulting in...

Extreme Networks partners with Core to Cloud

There’s no denying that cloud-managed network services have seen rapid growth in the past year alone. As we move into a future of remote and flexible working, cloud and wireless technology are absolutely essential for the long-term survival of organisations. Moving...

Let’s talk about cybersecurity in the NHS

In the last few years alone, the healthcare industry has benefited from a vast array of new technologies. With this digital evolution comes countless opportunities for advancement, from the development of medical equipment to improved care provision. However, great...

The unique difference Cylera makes in medical security

‘Built with hospitals, for hospitals’, Cylera solves the complex cybersecurity challenges that hospitals face. Cylera has built a next-gen healthcare IoT (HIoT) cybersecurity and intelligence platform. The groundbreaking technology has been specifically created for...

The Vectra Vision: AI-driven threat detection and response

Contrary to popular belief, cybersecurity breaches aren’t always caused by sophisticated attacks. In many cases, they happen as a result of entirely avoidable mistakes, such as unauthorized employee use, negligence, and human error, like clicking on links in phishing...

Pcysys – Your very own hacker in your pocket

Imagine having a skilled expert-hacker at your disposal. Imagine asking them to examine your company’s IT infrastructure for weaknesses that a malicious hacker would use to gain entry. Now imagine that your personal hacker could stay awake 365 days a year, performing...

Partners

Share This