Boldon James Logo

Information-Centric Security: Protecting Your Business Fortress From Perimeter to Core

Reading Time: 2 minutes We have all seen films where the defences of a medieval castle prevent the attackers from gaining entry – the deep moat, unscalable walls and impenetrable portcullis. From within the castle, the firing of arrows, canons and boiling oil… Read More

How Can Companies Move The Needle On Enterprise Cloud Security Risks And Compliance?

Reading Time: 3 minutes More than ever, customers understand their right to data privacy. As major brands continue to lose sensitive data to cybercriminals in high-profile cloud security failures, customer trust in companies across industries is fading. Only 25 percent of consumers believe… Read More

Important Considerations Ahead Of A Cloud Migration

Reading Time: 4 minutes “Data is the new oil” is a phrase we have come to hear all too often. Are they comparable, though? Oil is scarce, whilst data is anything but. However, when you start to dig into how these commodities are… Read More

Establish A Data Classification Model For Cloud Encryption

Reading Time: 3 minutes Not all data requires the same level of encryption. Use data classification to gauge your security needs, including for workloads that span on-premises and cloud environments. Data encryption might seem like a given in any IT security strategy, but… Read More

With GDPR upon us, here’s what the C-Suite needs to know about cybersecurity

Reading Time: 4 minutes The EU General Data Protection Regulation (GDPR) is finally upon us. That means if your organisation handles data on any European citizens, you will need to pay attention. The good news is that the rising profile of cyber-threats over… Read More