Boldon James Logo

Deploy Multiple Defence Layers To Protect Data-Rich Applications

Reading Time: 3 minutes What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? The first step any organisation needs to take to protect itself against an application layer attack is… Read More

In Terms Of Main Threat Actors, Expectation Rarely Matches Reality

Reading Time: 2 minutes Netwrix conducted a study of the major IT risks that are significant for most organizations and assessed respondents’ readiness to withstand cyber threats. The report is based on the feedback of 1,558 organizations of various sizes from many different… Read More

Tesla Data Theft Case Illustrates the Danger of the Insider Threat

Reading Time: 3 minutes Tesla filed a lawsuit against a former employee this week after it learned he made changes to company source code and exported gigabytes of proprietary data to unknown third parties. Tesla CEO and business magnate Elon Musk learned a… Read More

With GDPR upon us, here’s what the C-Suite needs to know about cybersecurity

Reading Time: 4 minutes The EU General Data Protection Regulation (GDPR) is finally upon us. That means if your organisation handles data on any European citizens, you will need to pay attention. The good news is that the rising profile of cyber-threats over… Read More

Seven reasons to classify your data

Reading Time: 3 minutes The best way to protect and govern your data is to let it tell your business applications and infrastructure what it contains. Chris Farrelly, General Manager at HANDD Business Solutions, explains how that’s possible and why you should do… Read More