Our Voice
What is Cloud Transformation? The Complete Guide
Discover what cloud transformation means, its benefits, and how CWSI helps businesses modernise IT systems and drive innovation through cloud solutions.
Our Voice
Discover what cloud transformation means, its benefits, and how CWSI helps businesses modernise IT systems and drive innovation through cloud solutions.
Our Voice
Discover what cloud transformation means, its benefits, and how CWSI helps businesses modernise IT systems and drive innovation through cloud solutions.
Our Voice
Learn everything you need to know about Advanced Persistent Threats in this guide by CWSI. Get in touch today for more information.
Our Voice
Learn all you need to know about Cyber Threat Actors in this detailed guide from CWSI. We discuss different actor groups, techniques and tactics.
Our Voice
Discover what Microsoft Intune is, in this detailed guide from CWSI Security. We outline the benefits of this solution and how it can benefit your business.
Our Voice
Our Voice
Learn why CWSI were awarded Microsoft Compliance Partner of the Year at the 2024 awards in this article. We discuss why this award is important to our business.
Our Voice
Discover 6 key benefits of partnering with a member of Microsoft’s Intelligent Security Association (MISA), in this detailed blog from CWSI Security.
Podcast
Listen to CWSI’s Mark Mitchell as he joins Microsoft’s Jeroen Jansen on the Microsoft’s Security Hacks Podcast as they discuss the role of a CSOC.
Our Voice
Explore Microsoft 365 E5 Security with this detailed guide from CWSI Security. We discuss this software in full, as well as its compliance add-ons.
Our Voice
Discover what an E-skimming attack is in this guide from CWSI. We define this type of attack, how they work and what options are available if you are hit by one.
Our Voice
Our Voice
Our Voice
Discover what a Threat Intelligence Analyst does in this guide from CWSI. We discuss roles, responsibilities and what they can bring to the table.
Our Voice
Our Voice
Discover the history of ransomware in this detailed guide from CWSI. We discuss a range of cyber attacks including the original Trojan attack by Joseph Popp.
Our Voice
Our Voice
Read our Microsoft Azure B2B blog to learn its impressive benefits for external collaboration.
Our Voice
In this CWSI blog discover what Conditional Access is, how it works, why we need it, and much more.
Our Voice
Explore the depths of managed SIEM in this detailed blog from CWSI Security. We discuss what SIEM’s are, the benefits of using them and much more.
White Paper
Our Voice
We are delighted to announce that CWSI has met the rigorous requirements to become a Microsoft FastTrack Ready Partner.
Our Voice
Our Voice
Explore our detailed Apple iPhone timeline which documents it's 17 year history of revolutionary technological advancements.
White Paper
Discover the latest insights and strategies in our whitepaper, "Apple for Enterprise 2024." Learn how Apple products and services can transform your business.
Our Voice
Discover CWSI's SecureGuard services designed to safeguard our customers critical assets, ensure compliance and enhance overall resilience.
Our Voice
We are delighted to share that we have been acknowledged in the Deloitte EMEA Fast 500 for 2023 entering at place 335.
Our Voice
Our Voice
White Paper
Our Voice
Our Voice
In this blog, we explore the various differences between a CSOC and a SIEM, shedding light on the essential roles these components play within the intricate landscape of modern cybersecurity defences.
Our Voice
Discover our blog which dives into the 5 key threat actor groups, empowering organisations to recognise potential cyber threats before they materlise.
White Paper
Our whitepaper acts as a compass for modernising your security operations, offering actionable insights on shaping your next generations CSOC.
White Paper
Read our NIS2 Directors Guide, designed to highlight the senior management consequences of non-compliance and provide you with pivotal questions to access your compliance status.
Our Voice
Read our blog which delves into the shifting landscape of CSOC security, offering insights into upcoming trends to keep you well-prepared for the year ahead
Our Voice
Learn the layers of data security which will be required to successfully achieve NIS2 compliance before the directives October deadline.
Our Voice
Discover how Microsoft and NIS2 go hand in hand. Learn the various ways in which Microsoft can help you prepare for the new NIS2 requirements.
Event
Our Voice
Mickaella Glynn, Chief People Officer at CWSI Group, offers invaluable insights into how organisations can foster inclusivity and empower women in leadership roles.
Our Voice
Discover our exclusive interview with our CPO, Mickaella Glynn, who explores this year's International Women's Day theme #InspireInclusion.
Our Voice
Discover how adopting a Zero Trust Architecture can help you deliver on your NIS2 compliance posture.
Our Voice
In this blog we delve into the use of emerging technologies in Artificial Intelligence to transform your security systems.
Our Voice
Read our blog where we dive into how Microsoft Purview enables companies to govern and protect their data across multiple estates, whilst adhering to compliance regulations.
Our Voice
Discover the risks of enterprise AI adoption in this detailed guide from CWSI. We discuss AI and data, accuracy, plagiarism and copyright plus much more.
Our Voice
To help your organisation navigate the path to NIS2 compliance, this blog sheds a light on the implications of NIS2 across the European borders.
White Paper
To take your first step towards NIS2 compliance, we have composed a whitepaper to help you gain a greater understanding of the NIS2 regulations.
Our Voice
Kickstart your NIS2 compliance journey, and discover five key requirements of the directive with actionable insights on how to address them.
Our Voice
An identity-based attack is a cyberattack that targets and compromises the digital identity of individuals, organisations, or entities.
Our Voice
Within this blog, we explore the synergies between cyber security and AI, delving into how AI technologies can empower IT teams to automate and augment critical aspects of cyber security operations.
Our Voice
Our Voice
Business Email Compromise (BEC) is a devious and sophisticated scam that targets businesses and individuals who execute transfers of funds.
Our Voice
Our Voice
Our Voice
To help you protect your business over Christmas and get the New Year off on the right foot, here are some tips to stay one step ahead of cybercriminals.
Our Voice
CWSI are excited to have joined Microsoft Cyber Security Investment (CSI) programme, a programme which enables CWSI to provide specific funded engagements to customers across three key areas – threat protection, data security, and the Microsoft Sentinel suite.
Our Voice
There is a way to protect against 99% of these attacks, the answer is Cyber Hygiene. Cyber hygiene is the practice of following basic security principles and habits to reduce the risk of cyberattacks.
Our Voice
Microsoft's Digital Defence Report has a unique stance and can share wider insights on how the threat landscape has evolved and discuss the shared opportunities and challenges we all face in securing a resilient online ecosystem which the world can depend on.
Our Voice
Our Voice
Hear from CWSI’s Client Solution Director, Paul Conaty as he interviews Microsoft Azure expert, Raymond Mulligan, on the best practices to follow when organisations are migrating to cloud
Our Voice
CWSI, Ireland’s most experienced mobile and cloud security specialist, announces that it has been named Digital Technology Company of the Year at Technology Ireland's 2023 Award ceremony.
Our Voice
Our Voice
Our Voice
The Digital Operational Resilience Act is a new, critical act within the EU financial regulation. It is designed to improve the cybersecurity and operational resiliency of the financial service entities primarily around the ICT area.
Our Voice
Tune into Paul Conaty, discussing with Microsoft’s Nikoleta Gamanova and Tomás Casasco, the hot topic of upcoming the NIS2 directive that will come into national law on October 17th 2024, bringing a set of common standards that will affect a minimum of 180,000 European organisations across 18 sectors.
Our Voice
The average company’s data footprint keeps growing exponentially. Imagine this: people create 2.5 quintillion bytes of data and send 333.2 billion emails every single day.
Our Voice
Used correctly, an XDR solution can unite multiple isolate security tools and reduce the complexity that hinders fast detection and response. Here are five key best practices that make a strong case for adopting XDR.
White Paper
To help IT teams combat the challenges of today’s modern workplace, Samsung designed Knox Suite, an all-in-one solution for enterprise mobility and security. Download our 'An Introduction to Knox Suite' Whitepaper today to find out more.
Our Voice
Here is a quick guide to some of the widely used cyber security acronyms used for security operation centres.
Our Voice
As the world becomes more connected and digital, cybersecurity is becoming more complicated. Here are six cyber security trends you need to know to prevent compromise.
Our Voice
What is the Best Managed Companies programme, and what does it mean to receive this recognition? Our Chief People Officer, Mickaella Glynn, walks you through.
White Paper
A CSOC service proactively monitors an organisation’s estate and receives and analyses large amounts of real-time data to gain visibility of activities across this environment. Download our Guide today to discover the key elements and benefits of a Security Operations Centre.
Our Voice
CWSI, has been named as one of Ireland’s Best Managed Companies. The awards programme is led by Deloitte Ireland, in association with Bank of Ireland.
Our Voice
CWSI announces the appointment of Mark McKeon as Director of Managed Services. Mark joins CWSI from Microsoft EMEA, where he led the consulting, support, and enterprise services teams.
Our Voice
Three Device Management will be supported by CWSI, a leading European mobile and security management specialist. CWSI will provide service delivery and support expertise for the Three Device Management product suite, including professional, managed and support services.
Our Voice
CWSI announces a new partnership with Chorus, a UK-based cybersecurity partner specialising in Managed Extended Detection and Response (MXDR).
Report
Our Voice
CWSI, Ireland’s most experienced mobile and cloud security specialist, today announces that it has been named Company of the Year at the 2023 Tech Excellence Awards.
Our Voice
A decentralised workforce and remote working practices create an attractive target for cyber criminals.
White Paper
Our Voice
Our Voice
Event
What level of risk do cyber threats and ransomware pose to your business?
Our Voice
Report
White Paper
Our Voice
Our Voice
Our Voice
Our Voice
Report
Our Voice
Our Voice
CWSI was welcomed into the MISA community back in 2021. Being part of this prestigious group, allows us to expand our view, collaborate with our peers and learn from the very best in our industry.
Our Voice
Our Voice
Video
Report
Video
Our Voice
Our Voice
Our Voice