
Securing unmanaged devices with Clientless ZTNA
Clientless ZTNA enables secure access to unmanaged IoT and OT devices, reducing malware risk and lateral movement while supporting third-party and BYOD network access.

Clientless ZTNA enables secure access to unmanaged IoT and OT devices, reducing malware risk and lateral movement while supporting third-party and BYOD network access.

The 2025 Cyber Breaches Survey exposes the UK’s widening cybersecurity gaps—underscoring urgent leadership, cultural, and supply chain vulnerabilities that demand immediate, coordinated action.

Hackers are evolving, leveraging AI and malware-as-a-service to target organisations. Matt Berzinski of Ping Identity explores how businesses can turn the tables on cybercriminals.

Cybersecurity audits help businesses identify vulnerabilities, assess vendor risks, and ensure compliance. They optimise security strategies, minimise wasted resources, and strengthen defenses against evolving cyber threats.

Cyber criminals are becoming increasingly intelligent in their attempts to trick security solutions and mechanisms in companies using special techniques to disguise their attacks and prevent them from being detected.

AI has the potential to revolutionise cybersecurity for Critical National Infrastructure (CNI), enabling smarter threat detection, operational resilience, and faster incident response in an evolving threat landscape.

UK and European companies are leveraging AI-powered identity verification and fraud detection solutions to combat cyberthreats like deepfakes, ensuring data security and building digital trust.

AI-powered cyberattacks are growing more sophisticated, but organisations can fight back using AI-driven zero trust security, minimising vulnerabilities and preventing lateral movement within systems.

Chris Perrin highlights the top 10 cybersecurity threats facing the UK financial services sector, including ransomware, supply chain vulnerabilities, and evolving regulatory challenges.

Insider threats are rising in financial services, costing organizations millions. Robust security measures and proactive monitoring are essential to mitigate these risks effectively.

The UK’s digital transformation centres on secure digital identity solutions, enhancing public services by simplifying access, ensuring privacy, and promoting inclusivity for all citizens in essential areas including healthcare and education.

European firms’ AI plans are at risk due to data infrastructure blind spots, with many prioritising recovery from cyberattacks over effective prevention and mitigation strategies.

Cyber deterrence shifts cybersecurity from reactive to proactive, disrupting attackers’ motives by targeting their incentives. The PARC Framework addresses profit, anonymity, repercussions, and costs, reducing attack likelihood.

Decentralised digital identities (DCI) promise enhanced security and user control. However, widespread adoption faces challenges, including the need for better education and clearer benefits.

The NIS 2 directive enhances cybersecurity in critical industries, requiring proactive compliance and better risk management to mitigate cyber attack risks and improve security standards.

Internationally renowned data scientist Anthony Scriffignano on the need to make AI investments with humility, pragmatic realism, and a readiness to persevere.

Ensure remote workforce security by avoiding common mistakes: device mismanagement, falling for phishing, neglecting updates, and skipping multi-factor authentication.

Ransomware’s perilous impact demands comprehensive mitigation. Understanding its mechanics and bolstering defences through strategic monitoring, employee training, and disaster recovery planning is paramount.

In the wake of AI’s dominance, the overlooked but crucial concern of Quantum Computing emerges, urging businesses to prepare promptly.

Explore strategies from Splunk’s Mick Baccio to tackle stress, foster team empowerment, and embrace AI in cybersecurity.

Explore the evolving human-AI relationship in 2024: upskilling with new AI regulation, reevaluating business plans, and addressing deepfake threats.

Explore parallels between Formula One strategies and cybersecurity challenges. Learn how continuous adaptation ensures optimal performance in both domains

Implemented in 2023, the EU-US Data Privacy Framework now faces a critical test in 2024 with activist Max Schrems’ challenge.

Nation-state cyber-warfare and AI-driven disinformation campaigns will escalate in 2024, necessitating robust cyber-defence and disinformation countermeasures.

A fresh approach to automation is driving new efficiencies in ABB’s Procurement & Logistics (GBS) organisation.

How Ericsson is helping telecoms providers meet the world’s extraordinary demand for connectivity.

Aerohive Networks’ Roy Verboeket answers questions about the growth of cloud networking

CIISec CEO Amanda Finch on how business leaders can combat burnout in cybersecurity teams.

Witharecord shortage of skilled workers, retaining happy engineers is critical to business success. Here’s how.

Network fabrics are transforming enterprise networks, delivering high-speed, scalable, and secure connectivity for AI, cloud, and IoT-driven campuses. Insights by Sébastien Claret, Alcatel-Lucent Enterprise.

In this episode, Ross Billington and Rachael Beer from digital services giant Capita debate ‘augmented reality’, ‘digital transformation’, ‘robotics’ and more.
Searce’s SVP Patrick Bangert highlights AI’s potential and warns of a looming problem with potentially harmful consequences if left unresolved.

Clientless ZTNA enables secure access to unmanaged IoT and OT devices, reducing malware risk and lateral movement while supporting third-party and BYOD network access.

The 2025 Cyber Breaches Survey exposes the UK’s widening cybersecurity gaps—underscoring urgent leadership, cultural, and supply chain vulnerabilities that demand immediate, coordinated action.

Hackers are evolving, leveraging AI and malware-as-a-service to target organisations. Matt Berzinski of Ping Identity explores how businesses can turn the tables on cybercriminals.

Cybersecurity audits help businesses identify vulnerabilities, assess vendor risks, and ensure compliance. They optimise security strategies, minimise wasted resources, and strengthen defenses against evolving cyber threats.

Cyber criminals are becoming increasingly intelligent in their attempts to trick security solutions and mechanisms in companies using special techniques to disguise their attacks and prevent them from being detected.

AI has the potential to revolutionise cybersecurity for Critical National Infrastructure (CNI), enabling smarter threat detection, operational resilience, and faster incident response in an evolving threat landscape.

UK and European companies are leveraging AI-powered identity verification and fraud detection solutions to combat cyberthreats like deepfakes, ensuring data security and building digital trust.

AI-powered cyberattacks are growing more sophisticated, but organisations can fight back using AI-driven zero trust security, minimising vulnerabilities and preventing lateral movement within systems.

Chris Perrin highlights the top 10 cybersecurity threats facing the UK financial services sector, including ransomware, supply chain vulnerabilities, and evolving regulatory challenges.

Insider threats are rising in financial services, costing organizations millions. Robust security measures and proactive monitoring are essential to mitigate these risks effectively.

The UK’s digital transformation centres on secure digital identity solutions, enhancing public services by simplifying access, ensuring privacy, and promoting inclusivity for all citizens in essential areas including healthcare and education.

European firms’ AI plans are at risk due to data infrastructure blind spots, with many prioritising recovery from cyberattacks over effective prevention and mitigation strategies.

Cyber deterrence shifts cybersecurity from reactive to proactive, disrupting attackers’ motives by targeting their incentives. The PARC Framework addresses profit, anonymity, repercussions, and costs, reducing attack likelihood.

Decentralised digital identities (DCI) promise enhanced security and user control. However, widespread adoption faces challenges, including the need for better education and clearer benefits.

The NIS 2 directive enhances cybersecurity in critical industries, requiring proactive compliance and better risk management to mitigate cyber attack risks and improve security standards.

Internationally renowned data scientist Anthony Scriffignano on the need to make AI investments with humility, pragmatic realism, and a readiness to persevere.

Ensure remote workforce security by avoiding common mistakes: device mismanagement, falling for phishing, neglecting updates, and skipping multi-factor authentication.

Ransomware’s perilous impact demands comprehensive mitigation. Understanding its mechanics and bolstering defences through strategic monitoring, employee training, and disaster recovery planning is paramount.

In the wake of AI’s dominance, the overlooked but crucial concern of Quantum Computing emerges, urging businesses to prepare promptly.

Explore strategies from Splunk’s Mick Baccio to tackle stress, foster team empowerment, and embrace AI in cybersecurity.

Explore the evolving human-AI relationship in 2024: upskilling with new AI regulation, reevaluating business plans, and addressing deepfake threats.

Explore parallels between Formula One strategies and cybersecurity challenges. Learn how continuous adaptation ensures optimal performance in both domains

Implemented in 2023, the EU-US Data Privacy Framework now faces a critical test in 2024 with activist Max Schrems’ challenge.

Nation-state cyber-warfare and AI-driven disinformation campaigns will escalate in 2024, necessitating robust cyber-defence and disinformation countermeasures.