Skip to main content

Content hub

cybersecurity

Search
Man looking unhappy after impersonation attack
12 Min

Business Email Security: What Is An Impersonation Attack?

Learn what an impersonation attack is, how it works in business email security, and the practical steps your team can take to...

man sending secure email in office from laptop
8 Min

Building a Business Case for Secure Email: Risk, Cost-to-Serve, & Trust

Build a business case for secure email that links risk reduction, lower cost-to-serve, and stronger customer trust, with...

Janet Bastiman Napier AI
7 Min

Regulated AI: Explainability, Oversight, and Defensible Financial Crime Decisions

Understand the importance of explainability, oversight, and defensible decisions in regulated AI...

Woman talking on her phone
8 Min

Is WhatsApp Secure Enough for Sensitive Information?

Is WhatsApp secure enough for sensitive information? A practical guide for UK professionals on...

Woman made a mistake in the office
11 Min

Human Error and Outbound Email Security: Risks & Solutions

Human error email security: why mistakes happen, what they cost, and practical steps to reduce...

Male and female colleagues assessing problem on laptop
6 Min

Quantum Computers & Encryption: What to Worry About (& What Not To)

Quantum computing and encryption, decoded. Learn what to worry about (keys,...

Secure email for finserv
7 Min

Secure Email for Financial Services: A Complete Guide

A practical guide to secure email in financial services, covering compliance,...

Dougie Robb Smart Data Foundry
8 Min

Building Trust at Scale Through Smarter Financial Data

Smart data can drive fairer outcomes. Learn how Smart Data Foundry uses a...