blog

PenTestBLOG.jpg
Types of Penetration Test - What is the Difference?
nordwood-themes-C0sW3yscQXc-unsplash.jpg
2019 Round Up

2019's seen significant advances in technology, in a digital landscape that's evolving rapidly.

Here’s a round-up of just some of the technology issues, events and challenges that have characterised the year.

Direct-SecureTour Event Blog Image.png
Chess Delivering Cybersecurity Collaboration

Did you miss SecureTour or want to refresh your memory? Watch the technical demonstration from SecureTour, now available online.

121022 - Forcepoint Webinar Event Page Banner.jpg
Simplifying Digital Transformation

Dave Barnett, Head of CASB at Forcepoint, shares the lessons he has learned from over 80 customer implementations of CASB technology – the good, the bad and the downright ugly.

Direct-SecureTour Event Blog Image.png
SecureTour 19: Cybersecurity Collaboration

Watch the highlights from our SecureTour 2019: Cybersecurity Collaboration

windows blog.jpg
Have You Made The Switch?

Windows 10 has a huge number of features which continues to grow larger with each new update from Microsoft.

In this video, I’ll go over 5 great features that you should be using to enhance your overall experience with Windows 10. This will include a few well-known features along with ones that you may have overlooked, forgot about or didn’t know existed.

sophos blog.jpg
What is next for malware?

Malware is a major problem worldwide, but the nature of malware is changing.

Despite numerous anti-malware measures, cybercriminals and hackers aren’t ones to give up easily, especially when there’s money to be made.

We welcome Jonathan and Fraser from Sophos HQ – they’re with us to discuss if AI can help towards the fight, and what we can do to protect ourselves.

PenScreen.jpg
Penetration Test Versus Vulnerability Assessment

For years customers have been confused what is the difference between a Penetration Test and a Vulnerability Assessment, with CREST officially launching separate accreditation for the two techniques now. Read this article to learn more.

sophos-cloud-optix-sn_a.jpg
Securing the Public Cloud with Sophos and Chess

Are you managing, moving, or planning to move to Amazon Web Services, Microsoft Azure, or Google Cloud Platform? Watch this video to learn more about how you can ensure the security of your data in the cloud.

university-of-bedfordshire-subnav-k.jpg
Leveraging the Power of Logs

Learn more about security information and event management solutions and how LogPoint's special pricing for universities helps them save money and improve efficiency. 

Blog Post 750x500px.jpg (6)
Untangling the web of IT security

We head over to Sophos to discuss all thing IT and security with Jonathan Hope (Sophos) and Gavin Wood (Chess) asking those important questions, What do you need to protect your network, is public cloud secure and how you can train your staff to help against the fight of IT Security. 

Can You Hack It.jpg
8 Tips for Choosing the Right Multi-factor Authentication Solution

Read 8 Tips for Choosing the Right Multi-factor Authentication Solution – a guest blog post by SecurEnvoy - to help you make the right decision for your organisation.