Cyber Security Threat Insight & The Evolving CISO Role Following on from our CISO Predictions released in December, our Director of Cyber Security Sales, James Fernley, shares what is on his mind ahead of 2025. From Insider Threats, to the prevalence of Ransomware, to the evolving role of a... Watch now
CIO Report 2020 Welcome to Acora’s first CIO Report! We wanted to understand what the key priorities are for today’s CIOs, how CIOs view the biggest technology concerns of the day, and how organisations are spending their technology budgets. Read now
Gated Content The Pivotal Role of a Managed SOC 70% of medium-sized businesses reported breaches or attempted cyber-attacks within the last 12 months. In the UK, the total annual cost of cybercrimes for businesses is £21 million. You can’t hide from those numbers, so how can a best-of-breed Managed SOC play a part in reducing them? Read now
Data & AI Evolving Roles in the Age of AI In this thought-provoking discussion, Darshna, Elastacloud’s Chief AI Officer, sits down with Sandy, Chief Innovation Officer at Elastacloud, to explore how evolving roles in the Age of AI are redefining the C-suite. As titles like Chief AI Officer gain traction,... Watch now
Gated Content The Future of Disruptive Tech GenAI is the game-changer that’s not just knocking on the door—it’s kicking it wide open. As disruptive technologies step in to automate the repetitive, transform industries, redefine workflows, and offer massive advantages for companies that dare to embrace its potential, what does the future hold? Dive in and discover how this disruptive technology is reshaping the landscape of knowledge work. Read now
Gated Content A Guide to Right-Sized Cyber Security All too often, we see CISOs taking a ‘product-centric’ approach to cyber security. By that we mean identifying a need, then simply buying the most expensive, best-in-class solution – often precisely because it’s the latest-and-greatest. Except that’s not true. There is no one solution that suits everyone. Instead, we want to introduce and encourage a risk based, right-sizing approach to cyber security. Read now
Cyber Security Building Layered Security & Proactive Threat Detection Build Layered Security & Proactively Manage Threat Detection Cyber threats can be categorised into opportunistic, material, and targeted attacks, each requiring different levels of preparedness. Opportunistic Attacks Random, large-scale attacks such as phishing emails that aim to exploit vulnerabilities without... Read now
Gated Content Service Desk Outsourcing Deciding whether to outsource all or part of the IT support function, such as the IT service desk, is a common consideration amongst organisations of all sizes. In our outsourcing considerations, we’ve highlighted some of the key areas to consider when evaluating the option of service desk outsourcing. Read now