Learn more about security information and event management solutions and how LogPoint's special pricing for universities helps them save money and improve efficiency.
We head over to Sophos to discuss all thing IT and security with Jonathan Hope (Sophos) and Gavin Wood (Chess) asking those important questions, What do you need to protect your network, is public cloud secure and how you can train your staff to help against the fight of IT Security.
Read 8 Tips for Choosing the Right Multi-factor Authentication Solution – a guest blog post by SecurEnvoy - to help you make the right decision for your organisation.
How Cyber Savvy Are You? Our 25 Cyber Must Knows.
Download this government checklist to reveal how ready you are to fight off a cybercrime attack.
We have been certified under the G Cloud 11 Framework to offer a suite of cyber security solutions to UK Government Organisations, including the NHS.
This week we are once again joined by Stuart White, Chess Penetration Tester, he takes us through a live hack, this time demonstrating the importance of endpoint protection in your systems and how a Rubber Ducky attack can very quickly compromise your tech.
This week we are joined by Stuart White, Chess Penetration Tester, he takes us through a live hack, targeting Office 365 accounts and the techniques you should be aware of to avoid being compromised, even when using 2-factor authentication.
Keeping track of assets in public cloud providers like AWS, Microsoft Azure, or Google Cloud Platform - and keeping them safe - is the toughest challenge in cloud security.
Chess CyberSecurity pick up double awards from Sophos and Forescout for stand out innovation in the sector.
Not all Penetration Test Reports are created equal. Methodology can vary from supplier to supplier, but the essential element common to all Penetration Tests is the written report, key to guaranteeing the maximum value from the overall process. What should you look for in a Penetration Test Report?
Sophos' study of 10 cloud server honeypots, placed worldwide, reveals how relentlessly persistent cybercriminals can be when targeting an organisation’s cloud platforms.
Leasing is the purchase model that more and more companies are opting for, according to Gartner, who estimate that by next year, 30% of business devices will be purchased through an opex model. Find out the Seven Top Reasons why.