Sponsor

Download IKANOW’s eBook – “Enhancing Threat Feeds with Analytics: Making Threat Feeds Work for You” [Sponsor]

Many thanks to the great folks at IKANOW, who have sponsored my writing for the past week. IKANOW exists to advance cybersecurity through an open, scalable, high-throughput, data agnostic, analytics platform that is able to continuously optimize an enterprise’s cybersecurity posture and sharply reduce risk. IKANOW’s experience conducting high-value military intelligence work drove us to

See what lost productivity costs your company. Try Layer8 from Logfiller free for 30 days [Sponsor]

Many thanks to the great folks at Logfiller, who have sponsored my writing for the past week. Thanks! “We had no idea…!” See what lost productivity costs your company. Layer8 from Logfiller is a new data source that gives powerful and precise insight into what happens across IT systems in real-time. It provides broad and

Could you spot a Snowden? Admins or contractors could be a threat to your data [Sponsor]

Many thanks to the lovely folks at Wallix, who have sponsored my writing for the past week. Thanks! We should all know by now the enormous impact that Edward Snowden has had on the world, leaking intelligence documents which revealed the scale and scope of covert surveillance on regular internet users, companies and – indeed

[Sponsor] IKANOW – continually optimizing your enterprise’s security posture and reducing risk

Many thanks to IKANOW, who have sponsored my writing for the past week. Thanks guys! IKANOW exists to advance cybersecurity through an open, scalable, high-throughput, data agnostic, analytics platform that is able to continuously optimize an enterprise’s cybersecurity posture and sharply reduce risk. IKANOW’s experience conducting high-value military intelligence work drove us to build a

[Sponsor] activereach’s free guide to DDoS attacks and mitigation

Many thanks to DDoS mitigation and testing specialists activereach, who sponsored my writing for the last few weeks. Thanks guys! You can receive the latest part of activereach’s free “Guide to DDoS and mitigation 2015” now. In activereach’s guide to DDoS and mitigation, Max Pritchard of activereach looks at DDoS attacks and mitigation strategies, and

[Sponsor] activereach’s free guide to DDoS attacks and mitigation

Many thanks to DDoS mitigation and testing specialists activereach, who are currently sponsoring my writing. Thanks guys! Receive the latest part of activereach’s free “Guide to DDoS and mitigation 2015” now. In activereach’s guide to DDoS and mitigation, Max Pritchard of activereach looks at DDoS attacks and mitigation strategies, and also looks at the way

[Sponsor] activereach’s free guide to DDoS attacks and mitigation

Many thanks to DDoS mitigation and testing specialists activereach, who are currently sponsoring my writing. Thanks guys! Receive the second part of activereach’s free “Guide to DDoS and mitigation 2015” now. Part three “Aspects of DDoS mitigation testing” will be released to coincide with the launch of activereach’s new public cloud security portfolio at Infosec

[Sponsor] MYDIGIPASS – One solution to secure mobile and web applications

Many thanks to authentication experts VASCO, who again sponsored my writing for the past week. Thanks guys! MYDIGIPASS is VASCO’s cloud-based, two-factor authentication service that enables application providers to deliver a single and secure login experience for their users, across multiple web and mobile applications. MYDIGIPASS protects your online accounts by adding an additional security

[Sponsor] Everything you wanted to know about cloud security in your enterprise

Many thanks to secure cloud hosting experts FireHost, who again sponsored my writing for the past week. Thanks guys! FireHost is offering readers a free white paper by independent analyst and consultancy firm Ovum, that explores the challenges and opportunities in adopting the cloud, and the role of security in furthering cloud acceptance across applications

[Sponsor] “Security of Internet Payments – Legislative Developments in Europe” – a free report to download

My sincere thanks to authentication experts VASCO, who have sponsored my writing for the past week. Thanks guys! Following the popularity of the free mobile security ebook and free reference guide to building a secure mobile strategy, VASCO Data Security is now offering readers of Graham Cluley Security News a new guide that will is

[Sponsor] Everything you wanted to know about cloud security in your enterprise

My sincere thanks to secure cloud hosting experts FireHost, who have sponsored my writing for the past week. Thanks guys! FireHost is offering a free white paper by independent analyst and consultancy firm Ovum, that explores the challenges and opportunities in adopting the cloud, and the role of security in furthering cloud acceptance across applications

[SPONSOR] Learn how to successfully implement a secure mobile strategy – Download VASCO’s free guide

My sincere thanks to authentication experts VASCO, who have sponsored my writing for the past week. Thanks guys! Following the popularity of the free mobile security ebook VASCO gave away last week, they’ve put together a new free reference guide which aims to help you build a secure mobile strategy that your users will love.

[SPONSOR] VASCO’s free guide to securing mobile apps – download now!

My sincere thanks to VASCO, who have sponsored my writing for the past week, and continue to sponsor me for the upcoming week too. Check out their free ebook about mobile security or their free guide for implementing a secure mobile strategy. Thanks guys! Mobile applications are changing the way business is done, offering instant

[SPONSOR] WiKID Two-factor Authentication without the hassle factor – Free for 5 users!

My sincere thanks to WiKID, who have sponsored my writing for the past week. Check out their two-factor authentication solution – which is free for five users. Thanks guys! Here is how they describe their product: The WiKID Strong Authentication System is a dual-source, on-premises two-factor authentication solution for enterprises. The WiKID server is simple

[SPONSOR] IKANOW’s free eBook “Beyond The Kill Chain”

My sincere thanks to IKANOW, who have sponsored my writing for the past week. Thanks guys! The Kill Chain can play an important part of your cyber defense – however it’s a very reactive approach. Download IKANOW’s latest FREE eBook, “Beyond The Kill Chain: How Information Security Platforms Must Evolve For Today’s CISO” to learn

[SPONSOR] activereach’s free guide to DDoS attacks and mitigation

My sincere thanks to DDoS mitigation and testing specialists activereach, who have sponsored my writing for the last four weeks. Thanks guys! Receive part one of activereach’s free “Guide to DDoS and mitigation 2015” now and also receive “Assessing the risk to business of DDoS attacks” and “Aspects of DDoS mitigation testing” free over the