Cloud Transformation and Data Threats

In this clip from our recent webinar ‘Data Security and Data Protection in 2024’, Sam Malkin talks about the challenges of securing data across hybrid architectures and multi-cloud deployments, and the importance of maintaining data security and privacy by design amidst rapid cloud vendor evolution. Sam discusses how organisations can effectively ensure alignment with data […]

Is Your Data At Risk When Using AI?

In this clip from our recent webinar ‘Data Security and Data Protection in 2024’, Sam Malkin, HANDD’s Lead Solution Architect explores the rapid adoption of Artificial Intelligence (AI). Sam highlights AI’s potential to significantly boost global GDP through enhanced efficiency and productivity but warns that this growth brings substantial cybersecurity challenges, with many organisations lacking […]

Regulation and Compliance – What Drives Data Security Adoption?

In this clip from our recent webinar ‘Data Security and Data Protection in 2024’, Sam Malkin, HANDD’s Lead Solution Architect discusses the crucial role of regulation and compliance in driving data security adoption. Key regulations discussed include PCI, ISO, GDPR, CCPA, and the upcoming Digital Operational Resilience Act (DORA). Compliance with these regulations often involves […]

What is a ‘Data Centric’ Security Baseline?

In this clip from our recent webinar ‘Data Security and Data Protection in 2024’, Sam Malkin, HANDD’s Lead Solution Architect discusses the critical importance of a data centric security baseline. Sam emphasises the need for a data-centric cybersecurity model, and advocates for increased visibility and protection across all data forms and locations, whether at rest, […]

What Have We Learned from GDPR?

A blog from guest author Trinny Truu, Field Marketing Manager at Cleo. It’s been almost 12 months since businesses all over started panicking about the European Union’s General Data Protection Regulation (GDPR) and with the one-year anniversary fast approaching (25 May 2019), what have we learned over this past year? The introduction of GDPR made […]

How Security Professionals can Solve the Biological need to Break the Rules

A blog from guest author, Dave Barnett, CASB Specialist at Forcepoint Would you allow someone else to delete the apps on your phone? Like many, I have an emotional connection with my device and what’s on it, so woe betide anyone touching my apps. However, I use my device for both work and personal activities, […]

Data Security != IT

At the start of spring media outlets started to report leaked classified US documents appearing online. Timelines suggest as early as March these highly classified documents were found on a platform known as Discord. Discord is a social media platform popular with online gamers, so not the type of place they’d typically be circulating data […]

Axiomatics and HANDD Business Solutions Partner to Deliver Dynamic Authorization

Axiomatics, the leader in delivering award-winning, next-generation authorization, today announced a reseller partnership with HANDD Business Solutions (HANDD), a UK-based independent specialist in global security. The partnership extends Axiomatics’ Orchestrated Authorization strategy to reach HANDD’s customer base across 27 countries worldwide. Axiomatics’ award-winning attribute-based access control (ABAC) enables organizations to ensure access decisions are made in real-time. Leveraging this platform, […]

Why Improving Cyber Security Awareness Isn’t Enough

Every day we hear in the news that there has been a new Cyber Security threat. Every day another big brand brings us news of the latest and biggest attack by Cyber Criminals. But why and how are these types of attacks still happening? Companies are investing billions of pounds in new technology and state […]

Data Classification Solutions: Four Points to Consider When Choosing a Provider

In a world where security breaches are a very real threat to business interests, organisations are actively deploying teams of people to source and manage solutions that protect, detect and respond to threats as they happen. Data classification is broadly defined as the process of labelling data by its sensitivity; a process which makes it […]