Cyber Security The Identity Shift Identity has become a primary target, with 𝟴𝟮% of data breaches and ransomware attacks being tied to compromised credentials. In today’s hybrid environments, legacy systems and IT infrastructure struggle to support modern security controls such as Multi-Factor Authentication (MFA) and... Listen now
Dora Compliance Checklist Prepare for DORA compliance! The enforcement date for DORA regulation is fast approaching – January 17, 2025. Financial institutions across the EU must be prepared for the upcoming changes, using tools like a DORA compliance checklist, as the act seeks to improve the digital resilience of financial entities against cyber threats. Read now
Cyber Security & Objectives Alignment Acora's Head of Enterprise Security, Simon Crumplin and Head of Cyber Services, James Fernley, recently sat down with Citreno's Founder & CEO, Svetla Yankova, to explore what it really takes to build and manage a modern-day SOC. Listen now
CIO Report 2020 Welcome to Acora’s first CIO Report! We wanted to understand what the key priorities are for today’s CIOs, how CIOs view the biggest technology concerns of the day, and how organisations are spending their technology budgets. Read now
Predictions CISO-nary Visions for 2025 & Beyond As we reach the end of 2024 and look ahead, we’ve come to that magical time of year when the internet lights up with everyone suddenly becoming a Nostradamus of cyber, throwing out predictions left, right and centre. This year,... Read now
Gated Content Service Desk Outsourcing Deciding whether to outsource all or part of the IT support function, such as the IT service desk, is a common consideration amongst organisations of all sizes. In our outsourcing considerations, we’ve highlighted some of the key areas to consider when evaluating the option of service desk outsourcing. Read now
CIO Report 2022 Building on the success of the 2021 survey, we reached out to CIOs and other IT leaders in organisations across the UK to get a sense of the challenges they’re facing such as hybrid working, and how they see things developing over the coming months. Read now
Gated Content Successful IT & Cyber Projects Guide Cyber Security and IT projects often fail due to unclear objectives, unrealistic schedules, inadequate resources, poor project management, and stakeholder disengagement. With 75% of business and IT executives thinking their software projects will fail, we dissect why so many projects are at risk of failing and how to overcome these alarmingly high stats. Read now