Gated Content Risk vs. Threat: A Strategic Approach The extent to which we understand ourselves—and, more importantly, our adversaries—has become increasingly critical, as cyber threats are no longer a matter of ‘if’ but ‘when.’ This discourse ventures into the realm of cyber security, focusing on the tangible and... Read now
Gated Content Introducing our new Group CTO Meet our new Group CTO, Richard Conway! In this video, Richard shares his vision for the future, insights on leadership, and his plans to drive innovation across Acora and our customer base. Join our Insights platform today to watch the... Watch now
Gated Content A Guide to Right-Sized Cyber Security All too often, we see CISOs taking a ‘product-centric’ approach to cyber security. By that we mean identifying a need, then simply buying the most expensive, best-in-class solution – often precisely because it’s the latest-and-greatest. Except that’s not true. There is no one solution that suits everyone. Instead, we want to introduce and encourage a risk based, right-sizing approach to cyber security. Read now
Gated Content The Ultimate Guide to SLA’s & XLA’s An Experience Led Approach is one of the IT industry’s hottest topics – and one we’ve been talking about here at Acora for longer than most. In this guide, we’ve set out some of the background to the XLA, how it differs from and adds to SLA metrics and adoption dimensions of our own Experience Led Approach™, built in by design. Read now
Gated Content Keeping up with endpoint threats Ever-growing cyber threats are a concern for everyone. But for IT leaders, the pressure has been ramped up to a new level. Tackling this can feel overwhelming, but it doesn’t need to be. Let’s go back to basics and start with endpoint protection. Read now
Building Layered Security & Proactive Threat Detection Build Layered Security & Proactively Manage Threat Detection Cyber threats can be categorised into opportunistic, material, and targeted attacks, each requiring different levels of preparedness. Opportunistic Attacks Random, large-scale attacks such as phishing emails that aim to exploit vulnerabilities without... Read now
Predictions CISO-nary Visions for 2025 & Beyond As we reach the end of 2024 and look ahead, we’ve come to that magical time of year when the internet lights up with everyone suddenly becoming a Nostradamus of cyber, throwing out predictions left, right and centre. This year,... Read now
Gated Content Forward Thinking with Data Insights Implementing applications can be daunting, but it doesn’t have to be. Working with trusted partners to plan, deliver and maintain business solutions is the practical way forward. Evolve your decision making by using data intelligence. Read now