
Securing unmanaged devices with Clientless ZTNA
Clientless ZTNA enables secure access to unmanaged IoT and OT devices, reducing malware risk and lateral movement while supporting third-party and BYOD network access.

Clientless ZTNA enables secure access to unmanaged IoT and OT devices, reducing malware risk and lateral movement while supporting third-party and BYOD network access.

The 2025 Cyber Breaches Survey exposes the UK’s widening cybersecurity gaps—underscoring urgent leadership, cultural, and supply chain vulnerabilities that demand immediate, coordinated action.

Hackers are evolving, leveraging AI and malware-as-a-service to target organisations. Matt Berzinski of Ping Identity explores how businesses can turn the tables on cybercriminals.

Cybersecurity audits help businesses identify vulnerabilities, assess vendor risks, and ensure compliance. They optimise security strategies, minimise wasted resources, and strengthen defenses against evolving cyber threats.

Cyber criminals are becoming increasingly intelligent in their attempts to trick security solutions and mechanisms in companies using special techniques to disguise their attacks and prevent them from being detected.

AI has the potential to revolutionise cybersecurity for Critical National Infrastructure (CNI), enabling smarter threat detection, operational resilience, and faster incident response in an evolving threat landscape.

UK and European companies are leveraging AI-powered identity verification and fraud detection solutions to combat cyberthreats like deepfakes, ensuring data security and building digital trust.

AI-powered cyberattacks are growing more sophisticated, but organisations can fight back using AI-driven zero trust security, minimising vulnerabilities and preventing lateral movement within systems.

Chris Perrin highlights the top 10 cybersecurity threats facing the UK financial services sector, including ransomware, supply chain vulnerabilities, and evolving regulatory challenges.

Insider threats are rising in financial services, costing organizations millions. Robust security measures and proactive monitoring are essential to mitigate these risks effectively.

The UK’s digital transformation centres on secure digital identity solutions, enhancing public services by simplifying access, ensuring privacy, and promoting inclusivity for all citizens in essential areas including healthcare and education.

European firms’ AI plans are at risk due to data infrastructure blind spots, with many prioritising recovery from cyberattacks over effective prevention and mitigation strategies.

Cyber deterrence shifts cybersecurity from reactive to proactive, disrupting attackers’ motives by targeting their incentives. The PARC Framework addresses profit, anonymity, repercussions, and costs, reducing attack likelihood.

Decentralised digital identities (DCI) promise enhanced security and user control. However, widespread adoption faces challenges, including the need for better education and clearer benefits.

The NIS 2 directive enhances cybersecurity in critical industries, requiring proactive compliance and better risk management to mitigate cyber attack risks and improve security standards.

Internationally renowned data scientist Anthony Scriffignano on the need to make AI investments with humility, pragmatic realism, and a readiness to persevere.

Ensure remote workforce security by avoiding common mistakes: device mismanagement, falling for phishing, neglecting updates, and skipping multi-factor authentication.

Ransomware’s perilous impact demands comprehensive mitigation. Understanding its mechanics and bolstering defences through strategic monitoring, employee training, and disaster recovery planning is paramount.

In the wake of AI’s dominance, the overlooked but crucial concern of Quantum Computing emerges, urging businesses to prepare promptly.

Explore strategies from Splunk’s Mick Baccio to tackle stress, foster team empowerment, and embrace AI in cybersecurity.

Explore the evolving human-AI relationship in 2024: upskilling with new AI regulation, reevaluating business plans, and addressing deepfake threats.

Explore parallels between Formula One strategies and cybersecurity challenges. Learn how continuous adaptation ensures optimal performance in both domains

Implemented in 2023, the EU-US Data Privacy Framework now faces a critical test in 2024 with activist Max Schrems’ challenge.

Nation-state cyber-warfare and AI-driven disinformation campaigns will escalate in 2024, necessitating robust cyber-defence and disinformation countermeasures.

IAG Loyalty discusses its multi-year digital transformation and the future of product and customer-centric loyalty.

A fresh approach to automation is driving new efficiencies in ABB’s Procurement & Logistics (GBS) organisation.

A decade ago, a team of machine data enthusiasts embarked on a mission to empower businesses – and Sumo Logic was born

World Wide Technology and the rise of industrial IoT

Ably’s Matthew O’Riordan on the real-time revolution disrupting enterprise

Teradata’s Kevin Lewis assesses the characteristics of different Chief Data Officers

Since embarking on a digital transformation four years ago, Mars has instilled a culture of user centric design and agile sprint delivery, leveraging Mars’ Digital Engine.
Praveen Moturu, VP, Chief Enterprise Architect, talks about its success stories, the importance of innovation and the value of continuous test and learn digital sprints

In this episode, IT consultant Ben Saunders and Contino’s Sam Lloyd explore “data analytics”, “silos”, “digital disruption” and more.

Clientless ZTNA enables secure access to unmanaged IoT and OT devices, reducing malware risk and lateral movement while supporting third-party and BYOD network access.

The 2025 Cyber Breaches Survey exposes the UK’s widening cybersecurity gaps—underscoring urgent leadership, cultural, and supply chain vulnerabilities that demand immediate, coordinated action.

Hackers are evolving, leveraging AI and malware-as-a-service to target organisations. Matt Berzinski of Ping Identity explores how businesses can turn the tables on cybercriminals.

Cybersecurity audits help businesses identify vulnerabilities, assess vendor risks, and ensure compliance. They optimise security strategies, minimise wasted resources, and strengthen defenses against evolving cyber threats.

Cyber criminals are becoming increasingly intelligent in their attempts to trick security solutions and mechanisms in companies using special techniques to disguise their attacks and prevent them from being detected.

AI has the potential to revolutionise cybersecurity for Critical National Infrastructure (CNI), enabling smarter threat detection, operational resilience, and faster incident response in an evolving threat landscape.

UK and European companies are leveraging AI-powered identity verification and fraud detection solutions to combat cyberthreats like deepfakes, ensuring data security and building digital trust.

AI-powered cyberattacks are growing more sophisticated, but organisations can fight back using AI-driven zero trust security, minimising vulnerabilities and preventing lateral movement within systems.

Chris Perrin highlights the top 10 cybersecurity threats facing the UK financial services sector, including ransomware, supply chain vulnerabilities, and evolving regulatory challenges.

Insider threats are rising in financial services, costing organizations millions. Robust security measures and proactive monitoring are essential to mitigate these risks effectively.

The UK’s digital transformation centres on secure digital identity solutions, enhancing public services by simplifying access, ensuring privacy, and promoting inclusivity for all citizens in essential areas including healthcare and education.

European firms’ AI plans are at risk due to data infrastructure blind spots, with many prioritising recovery from cyberattacks over effective prevention and mitigation strategies.

Cyber deterrence shifts cybersecurity from reactive to proactive, disrupting attackers’ motives by targeting their incentives. The PARC Framework addresses profit, anonymity, repercussions, and costs, reducing attack likelihood.

Decentralised digital identities (DCI) promise enhanced security and user control. However, widespread adoption faces challenges, including the need for better education and clearer benefits.

The NIS 2 directive enhances cybersecurity in critical industries, requiring proactive compliance and better risk management to mitigate cyber attack risks and improve security standards.

Internationally renowned data scientist Anthony Scriffignano on the need to make AI investments with humility, pragmatic realism, and a readiness to persevere.

Ensure remote workforce security by avoiding common mistakes: device mismanagement, falling for phishing, neglecting updates, and skipping multi-factor authentication.

Ransomware’s perilous impact demands comprehensive mitigation. Understanding its mechanics and bolstering defences through strategic monitoring, employee training, and disaster recovery planning is paramount.

In the wake of AI’s dominance, the overlooked but crucial concern of Quantum Computing emerges, urging businesses to prepare promptly.

Explore strategies from Splunk’s Mick Baccio to tackle stress, foster team empowerment, and embrace AI in cybersecurity.

Explore the evolving human-AI relationship in 2024: upskilling with new AI regulation, reevaluating business plans, and addressing deepfake threats.

Explore parallels between Formula One strategies and cybersecurity challenges. Learn how continuous adaptation ensures optimal performance in both domains

Implemented in 2023, the EU-US Data Privacy Framework now faces a critical test in 2024 with activist Max Schrems’ challenge.

Nation-state cyber-warfare and AI-driven disinformation campaigns will escalate in 2024, necessitating robust cyber-defence and disinformation countermeasures.