close

Smart Data Protection delivers true insights

How you can get more value from your data through discovery, intelligence and automation. It’s time to go beyond GDPR. In the lead up to May 25th when the new EU regulation came into force, millions of emails appeared in inboxes to alert people that their r...

How leading with threats helps prioritise your cyber security strategy

Security practitioners have long held the opinion that an understanding of assets and risk is the bedrock for security. This understanding increases confidence in the decisions made to allocate resources to protect the assets that really matter from the things...

Friday 13th: Tricks, Treats and Banking Trojans

Emotet is a common information stealer that targets Windows-based computer systems and functions as ...

There’s no perfect defense against cyber-attacks, so what do you do?

You no doubt remember when WannaCry ransomware infected computers around the world in May 2017. You ...

The BaseStriker phishing attack is back – targeting CEOs

The Fujitsu Cyber Threat Intelligence (CTI) Team have recently observed the BaseStriker security fla...