Reading Time: 5 minutes Cloud-based work environments are both convenient and cost-effective, especially in today’s remote world, but can present a challenge when it comes to meeting both regulatory compliance requirements and ensuring the protection of sensitive data. In order to maintain the… Read More

Reading Time: 2 minutes We have all seen films where the defences of a medieval castle prevent the attackers from gaining entry – the deep moat, unscalable walls and impenetrable portcullis. From within the castle, the firing of arrows, canons and boiling oil… Read More

Reading Time: 3 minutes More than ever, customers understand their right to data privacy. As major brands continue to lose sensitive data to cybercriminals in high-profile cloud security failures, customer trust in companies across industries is fading. Only 25 percent of consumers believe… Read More

Reading Time: 4 minutes “Data is the new oil” is a phrase we have come to hear all too often. Are they comparable, though? Oil is scarce, whilst data is anything but. However, when you start to dig into how these commodities are… Read More

Reading Time: 3 minutes Not all data requires the same level of encryption. Use data classification to gauge your security needs, including for workloads that span on-premises and cloud environments. Data encryption might seem like a given in any IT security strategy, but… Read More