NIS – do your security systems comply with the latest directive?

    Hands up if you’re aware of the Network and Information (NIS) Directive and what it means for your business. Unsure of the details? You’re not alone. The NIS Directive is the first piece of EU-wide legislation designed to boost the overall level of cybersecurity across member states and was launched just a few weeks before […]

      The importance of Secure by Default

      As the cybersecurity landscape continues to evolve at a rapid pace, partly thanks to the increasing use of Internet of Things (IoT) devices, businesses are beginning to face a proliferation of threats. This enhanced risk factor has no doubt been a driver for the implementation of new legislations, such as the General Data Protection Regulation […]

        Hardening Oil and Gas Infrastructures from Physical Threats and Cyberattacks

        As we enter a new year, I’m seeing many changes in the oil and gas industries. Producers are positioning themselves to embrace IoT and new devices to upgrade their existing remote pad sites and facilities. However, protecting new systems and devices isn’t without challenges. Cybersecurity is a major concern and protecting against cyberthreats is obviously […]

          How to maintain cybersecurity across all your devices

          Network administrators are under significant and increasing pressure to make sure their networks are designed and operated securely. So it is important that they have the right knowledge and tools to manage cybersecurity throughout the life cycle of the system. In this post, we will explore the cybersecurity best practices specific to managing their network […]

            Data center protection: Five fundamental steps

            Companies all over the globe rely more and more on data to improve their performance and revenue. This has made data centers crucial infrastructures, but also mouth-watering targets for cybercriminals. The increasing value of information has made data centers a prime target for nefarious intentions, from criminals stealing data for profit, to individuals wishing to […]