Boldon James Logo

The User-Driven Approach: 3 Main Steps

Reading Time: 2 minutes Following on from our introduction to user-driven security, and why people are seen as such a risk in business. We are now looking at the three main steps you can take to turn your people from a risk into… Read More

User-Driven Security: Transforming People Into Security Assets

Reading Time: 2 minutes Artificial Intelligence, User Behaviour Analytics, Zero-Trust… these are the buzzwords the security industry is currently dominated by. The developments to cyber security technology which have been made over the last few years are incredible, developments that are absolutely essential… Read More

The Balancing Act: Education vs Enforcement

Reading Time: 3 minutes Let’s face it – there are very few people in this world who like being told what to do. We often find that suddenly enforcing strict rules and big changes, in both social and working environments, is met with… Read More

Addressing the EU GDPR and New York Cybersecurity Requirements: 3 Keys to Success – Part 3

Reading Time: 3 minutes Following on from part one, and part two of this three part series, this week’s final instalment looks at Third-Party Risk… 3. Third-Party Risk Third parties can present your greatest area of risk exposure — both for data security,… Read More

Addressing the EU GDPR and New York Cybersecurity Requirements: 3 Keys to Success – Part 2

Reading Time: 2 minutes Following on from part one of this three part series, this week we look at Incident Response… 2. Incident Response Historically, too much IT security spending has focused on the prevention of data breaches, and not enough has gone… Read More