Managing identity permissions and risks in a multicloud environment

For businesses, managing identity permissions and risks in a multicloud environment is a daunting task. The ability to see what permissions are being used, moderate them, and automate processes is critical for achieving a well-secured and managed environment. Microsoft Entra Permissions Management (EPM) and Microsoft Defender for Cloud (MDC) provide comprehensive solutions for dealing with […]

Navigating the complex world of IAM and cloud security

Managing identity permissions and cloud security risks has become a critical challenge as organisations increasingly move their data and applications to the cloud. The growing number of cloud-based applications and services has made it more difficult to ensure that only the appropriate users have access to the appropriate resources, and that access is granted on […]

How to get the most from your security investments

Dave Cartwright is the Head of Technology Operations & Risk/Chief Information Security Officer at Santander International and the keynote speaker at the 2023 ITC Cyber Summit. In this blog, Dave provides his insight on the importance of getting the basics right, how the deployment of multiple security tools can be a challenge, and why throwing […]

Securing more with less – ITC Secure and Microsoft, a winning combination

 José Lázaro Pinos is a Security Solutions Expert at Microsoft and a headline speaker at the 2023 ITC Cyber Summit.  In this blog, José shares his insights on the current challenges faced by CISOs, how Microsoft Security Solutions can help you do more with less and why accredited Microsoft Solutions Partners like ITC can help […]

Security Announcements at Microsoft Ignite: A Quick Look

How ITC Secure Can Help Leverage New Capabilities Microsoft’s annual event, Ignite 2022, opened amidst global, economic and societal turbulence to introduce new technology capabilities and help people and businesses navigate unpredictability. The predominant theme was to equip organisations to do more with less. As Microsoft Chairman and CEO Satya Nadella explained, “It means applying […]

Raise Your Security Posture with Microsoft Entra Zero Trust

Pandemic-induced disruptions have catapulted security into a top business priority. The volume and viciousness of cyber attacks hit the roof during the pandemic as the corporate network extended to embrace the homes of employees working from living rooms and kitchens, accessing sensitive business information from personal devices. The State of Security Report 2022 finds 65% […]

Building trust in a hyper-connected world

The flood of technological change has led commentators to attach the prefix “hyper-” for special emphasis; the world is hyper-connected, supply chains are hyper-optimised, processes are hyper-specialised, and internet connectivity is hyper-fast.   The reality is that today’s need for speed and efficiency has left businesses increasingly vulnerable and the need for effective cyber security […]

Balancing Complexity and Simplicity in Cyber Security

The reality of cyber security today is that business leaders are having to contend with a high degree of complexity. From accelerated digital transformation and cloud adoption in support of an agile workforce to the dissolution of the traditional secure perimeter, such a situation is compounded by a cyber-skills shortage and an unmanageable volume of […]

Cyber risk: Why investors should care about cyber security

“A company’s cyber preparedness is a crucial consideration in any investor’s investment decision. It is a business risk that you cannot afford to ignore.” ITC Secure Chief Executive, Arno Robbertse, explains why and shares key indicators for cyber due diligence to consider. Originally published in Sensus Magazine. Link to the magazine: here As we have all witnessed, the pandemic pushed organisations over […]

The Importance of Fostering A Culture of Cyber Security

With many organisations around the world shifting gear to a hybrid working model and accelerating cloud adoption at speed, we continue to witness a surge of sophisticated cyber attacks backed by increased adversary motivation and capability. Therefore, it is not a surprise that cyber security has been identified as the top priority for businesses post-pandemic, […]