Reading Time: 3 minutes Some may simply associate this time of year with pumpkins, ghosts and ghouls, but it is also European Cyber Security Month (ECSM), the EU’s annual awareness campaign which takes place every year in the month of October. The aim… Read More
Reading Time: 4 minutes In July, NIST released draft versions of two new publications: NIST SP 800-171 Revision 2: Protecting Controlled Unclassified Information in Non-federal Systems and Organizations and NIST SP 800-171B: Protecting Controlled Unclassified Information in Non-federal Systems and Organizations: Enhanced Security… Read More
Reading Time: < 1 minute Kevin Carpenter, Regional Sales Director at Boldon James discusses the hot topic of automation and whether it truly has a place in the world of data classification, both now and in the future.
Reading Time: 2 minutes We’ve seen the introduction to user-driven security, and the three main steps to implementing a user-driven approach to security. The last instalment of this three part series covers the three main benefits to your organisation: 1. Reduces Risk of… Read More
Reading Time: 2 minutes Following on from our introduction to user-driven security, and why people are seen as such a risk in business. We are now looking at the three main steps you can take to turn your people from a risk into… Read More