Introduction to Ken Bodnar – Guest Keynote Speaker at Armour Expo

Ken Bodnar Introduction to Ken Bodnar, Principal Consultant at Blockchain Associates, Data Science Influencer, and one of the winners of the first challenge of the F1 Connectivity Innovation Prize. Ken Bodnar has a long career in advanced technology. He has … Read More

Introducing Blockchain Into The Enterprise

Blockchain Guest Blog by Ken Bodnar At a recent presentation that I gave, I described Blockchain as follows: “Blockchain is a solution to a problem that you never knew you had, with a technology that you don’t understand.”. There is much … Read More

The Top 3 Myths of GDPR in the Caribbean

Sorting the facts from the fiction The General Data Protection Regulation (GDPR) has been garnering much attention in recent months, particularly as it comes into force on 25 May 2018. With the effective date fast approaching, there is growing misinformation … Read More

5 Top Cyber Concerns Impacting Law Firms

Law firms are in a race against time With the introduction of the EU’s General Data Protection Regulation (GDPR) in May 2018, law firms are in a race against time to navigate through the myriad of cybersecurity challenges including an … Read More

How To Form Two Lines Of Cyber Resilience Against Insiders

Insiders are today’s biggest security threat By concentrating exclusively on outside threats, organisations are beginning to recognise that cyber threats also come from their own people, emphasising the need to implement employee awareness and education as well as creating a … Read More

The Motivations Behind Insider Threats And How To Deal With Them

CSOs and CISOs face a myriad of security challenges but more recently, the insider threat has taken a stranglehold on the evolving list of top risks to look out. As security professionals, we spend a lot of time focusing on … Read More

How To Stay Safe Online: 15 Ways To Avoid Being Hacked

Every month, there is a new hack that affects millions of people. The most recently documented hack was Google, where hackers were using a devilishly clever fake email attachment scam to break into people’s Gmail accounts, thus stealing valuable information … Read More

3 Top Cyber Security Threats To Look Out

Cybercriminals are becoming more sophisticated and collaborative with every coming year. From internal threats to creative ransomware to the industrial Internet of Things, cybersecurity threats are going to get even more creative and innovative. A recent report has suggested that … Read More

Gartner Names Mimecast a Leader EIA Magic Quadrant

Gartner has recognised Mimecast Cloud Archiving in its Magic Quadrant for Enterprise Information Archiving. With this year’s recognition, Mimecast has been named as a Leader for the second year in a row. Moreover, for the first time, Mimecast placed the … Read More