What is your name and role at Threat Protect? Jonil Patel – CISO and Founder What is the one piece of tech that you cannot live without? Mobile phone! Who can live without one? What are you reading/watching at the moment? First Man In, Leading by the Front by Ant Middleton. What would be your...
What is your name and role at Threat Protect? My name is Glyn Lewis and I’m an Account Manager at Threat Protect What is the one piece of tech that you cannot live without? I love using Shazam, in the days when we could go to places I loved hearing a new tune I’d not...
For obvious reasons it has been a challenging year for most. I think we can all agree that we would like to leave the words coronavirus, lockdown and pandemic in 2020 and regain some normality in 2021. However, it is the time of year for reflection. A chance to appreciate the triumphs, to recognise the...
I recently had a discussion with a group of IT friends that got quite heated. As it turns out data privacy can be quite an explosive topic. We each had our own lines in the sand when it came to who, what, when and why we share our data which is perfectly normal. Where it...
Whether it is adapting to a remote workforce, reducing headcount, or making other budget cuts, the Coronavirus pandemic has forced major changes to be made to protect the future of the business. Contradictory to this, eighty-two per cent of security and risk leaders do not adjust their budgets based on business or environmental impact. This...
Put simply, attackers want to access your data. Whether it is on-premises or in the cloud, your data needs to be protected and, in some cases, even put under compliance controls. The core principles for protecting your potentially business-critical data are: You need to know where your sensitive data is You need compliance controls for...
As cybersecurity threats become more sophisticated, the security market has become difficult to navigate, particularly now as we’re seeing increased cloud migration due to remote working. You may feel that you spend hours trying to find the right security solution for your business. But look no further. Watch this Threat Protect webinar with Netwrix, the...
Dynamically target high-payoff intellectual capital for customized technologies. Objectively integrate emerging core competencies before process-centric communities.