Who has time to read the the countless product fliers, brochures, or watches vendor webinars. But I do make time to read the Cherub cyber-blogs. They are following (and most of the time are ahead of) the industry trends in cybersecurity and data protection while boiling it all down to easy reading.
eBook: Cloud Information Management For Dummies
eBook: Cloud Information Management For Dummies Email. You use it constantly. And it’s the number-one application to keep your organization functioning. Organizations need email to stay up-and-running all the time. After all, it’s supposed to just work, right? But if...
The State of Email Security Report
The State of Email Security Report Email. You use it constantly. And it’s the number-one application to keep your organization functioning. Organizations need email to stay up-and-running all the time. After all, it’s supposed to just work, right? But if email isn’t...
Everything you Need to Know About the California Consumer Privacy Act of 2018
The California Consumer Privacy Act (CCPA), was unanimously passed by California lawmakers and signed into law by the Governor on June 28th, 2018. It gives California consumers unprecedented personal data protections and possibly sets the tone for similar legislation...
Top 10 trends for cybersecurity in 2019
What you should be on guard for this year and beyond. 10 | Cybersecurity in the boardroom A decade, perhaps two decades, late for some organisations, cybersecurity is now considered a key business risk by the board. 2019 will see this trend accelerate as boards demand...
Cloud-Delivered Cybersecurity Services are No Longer an Option
As Cybercriminals continue launching attacks from the web, companies need to meet the new cybersecurity and compliance challenges for 2019 and beyond. The adoption of the public cloud is driving a fundamental change in the way organizations connect remote users and...
Cyber security and small to medium-sized enterprises
How you protect yourself in 2019 as the Cybercrime continues to grow Cybercrime continues to surge without a slowdown in sight. Cyber security and small to medium-sized enterprises is a big issue, but businesses can take steps to protect themselves, says Brian...
Is the CIO’s work never done when it comes to digital transformation
To put an end date on a transformation project is to misunderstand the value of change Digital transformation is one of the most commonly used buzz phrases in business technology. Everyone, from the CIOs who buy kit to the vendors who hawk it, uses the term as...
Our Top 10 Predictions For 2019 in Cybersecurity
Number 1., Increase in crime, espionage and sabotage by rogue nation-states With the ongoing failure of significant national, international or UN level response and repercussion, nation-state sponsored espionage, cyber-crime and sabotage will continue to expand....
Will You Buy or Build Your Incident Response and Digital Forensics Services?
When you consider that corporations are likely to face a data security breach at some point—a matter of “when,” rather than “if”—then it becomes imperative that your company be prepared with a cybersecurity strategy. It may seem like a vexing challenge when the...