Sophos webinar - Connecting endpoint and network for better protection
Unifying ICT security contracts can help local authorities achieve big savings - and improve confidence in their protection - hear Sophos experts discuss during a dedicated webinar.
Tradition in some industries may be acceptable. In security, however, tradition can lead to weaknesses that can be exploited by cyber criminals. Innovation is the key – this is certainly the route taken by the attackers.
However, UK companies are still protecting themselves with firewalls, endpoint antivirus products, email and web filters that aren’t even slightly integrated, and haven’t evolved quickly enough for today’s Cyber-attacks.
Listen to Sophos security experts Stephen Bourne and John Umney present a white boarding webcast session to learn about how connecting your Endpoint and Network can provide better protection for your organisation. Stephen and John present a real life consolidation case study scenario and answer questions on the approach.
Supplier sought to support rollout of advance border control service
In rare speech, top spy Alex Younger claimed that ‘the digital era has profoundly changed our operating environment’
Department for International Trade to work with internet giant to help small businesses cash in on overseas opportunities
Although big-ticket technology announcements were largely absent from the chancellor’s speech, the Budget contained a number of initiatives and investments in digital and data
With the annual worldwide cost of cybercrime set to double from $3tn in 2015 to $6tn by 2021, BT offers advice on how chief information security officers can better protect their...
There’s a vast network that keeps our internet running, and it lives under the ocean
BT thinks The Internet of Things is about to undergo a revolution. Over the past two decades, we've seen IoT tech evolve from a possibility, to a novelty, to an established tool that plays a vital...
Quantum computers will soon make some of our strongest encryption useless. And that's where quantum cryptography comes in