Second Generation Cyber-Attacks

|

Many of us are aware of phishing and have probably already been the target of an indiscriminate campaign. Phishing is designed to trick the recipient into divulging personal details that can be used to defraud at a later date. By posing as reputable sources, such as banks or delivery firms, scammers attempt to glean the […]

read more

What Is Exonar?

|

Exonar is built on open source technologies, specifically utilising search technology, enabling companies to better organise and protect their information. The purpose is to remove risk and make data more productive and secure. Exonar’s system leverages Machine Learning to undertake data discovery and classification and is able to handle billions of documents. Exonar will enable […]

Practical Steps to GDPR Compliance

|

The General Data Protection Regulation (GDPR) takes effect on 25th May 2018 and is one of the most significant regulatory frameworks to hit organisations for some time. In 2016, the European Union adopted the new legislation that aims to give people more control over their personal information, including the right to be forgotten online and […]

Microsoft Azure – Time to Get Technical

|

The Microsoft Azure portfolio provides businesses with a suite of security products to help manage and control identity and user access. By combining Azure security services, businesses can employ a set of tools to secure and control their devices and data. How Does Microsoft Azure Manage And Control Identity And User Access? The Azure Active […]