In partnership with Condatis: Outlook for Identity and Access Management

ITC’s 8th annual Cyber Summit 2022 centres around the theme BEYOND – From resilience to risk. 2021 was the year where resilience was a must for organisations to survive, and whilst this will continue, 2022 is the year where organisations will need to go beyond surviving to thriving – by innovating and strengthening their approach to […]

SASE: a holistic solution for cyber security in an era of zero trust?

The global pandemic ushered in an era of rapid digital transformation as a result of new ways of working, opening up organisations to ever-more complex and sophisticated cyber threats. While most businesses found a way to muddle through the worst of it, the resulting hotpotch and complexity of today’s environment, because of the proliferation of […]

Ten trends shaping the 2022 cyber security landscape

The world is changing in fundamental ways, leading to dramatic shifts in the landscape of risks faced by businesses, where change is the only constant. As the new normal of hybrid work takes shape, organisations around the world are facing a surge of sophisticated cyber threats and increased complexities for security teams. In this new […]

Innovate Your Hybrid Workplace: Managing Users and Access

The adoption of the hybrid workplace, accelerated by the global pandemic, has more than doubled in the past year resulting in a long-term shift in how people work and operate daily. Whilst digital transformation has enabled businesses to meet new requirements and improve internal processes, it has also brought with it new levels of cyber […]

Innovate Your Hybrid Workplace: Identity Management (Part 2 of JML Workshop)

The adoption of the hybrid workplace, accelerated by the global pandemic, has more than doubled in the past year resulting in a long-term shift in how people work and operate daily. Whilst digital transformation has enabled businesses to meet new requirements and improve internal processes, it has also brought with it new levels of cyber […]