Our Voice
Resources
Our Voice
Ransomware Trends to Watch Out for in 2025
Our Voice
The Evolution of Cyber Fraud: Trends to Watch in 2025
Our Voice
Effective Strategies to Understand and Govern Your Data
Our Voice
A Step-by-Step Guide to Safeguarding Your Corporate Data with Microsoft Purview
White Paper
Microsoft Ignite 2024
Our Voice
What is Data Classification?
Discover the fundamentals of data classification, why it’s essential for secure information management, and how to implement it effectively in your organisation.
White Paper
Android 15 for Enterprise
Discover how Android 15 is revolutionising hybrid work, enhancing security, increasing productivity, and driving innovation in the modern workplace.
Our Voice
What Is Unified Endpoint Management?
Explore Unified Endpoint Management (UEM), its advantages, and how CWSI streamlines endpoint security for businesses. Read our comprehensive guide to learn more.
Our Voice
CWSI Partners with Hoxhunt to Revolutionise Cyber Security Training
Discover the partnership between CWSI and Hoxhunt and how it is transforming employee cyber security training.
Our Voice
What is Microsoft Defender for Endpoint?
Our Voice
Best Practices in Mobile App Security: Secure Your Customers Data
Our best practices for mobile device security. Learn how to protect your organisation from mobile threats with secure authentication, app management, and more.
Our Voice
From Data to Defence: How the Threat Intelligence Lifecycle Strengthens Cybersecurity and Compliance
Discover how the threat intelligence lifecycle can help you strengthen your organisation’s cybersecurity and compliance capabilities in this detailed guide.
Our Voice
What is Cloud Transformation? The Complete Guide
Discover what cloud transformation means, its benefits, and how CWSI helps businesses modernise IT systems and drive innovation through cloud solutions.
Our Voice
The Complete Guide to Advanced Persistent Threats
Learn everything you need to know about Advanced Persistent Threats in this guide by CWSI. Get in touch today for more information.
Our Voice
The Complete Guide to Cyber Threat Actors: Understanding and Defending Against Digital Threats
Learn all you need to know about Cyber Threat Actors in this detailed guide from CWSI. We discuss different actor groups, techniques and tactics.
Our Voice
What is Microsoft Intune? A Detailed Guide
Discover what Microsoft Intune is, in this detailed guide from CWSI Security. We outline the benefits of this solution and how it can benefit your business.
Our Voice
How to Navigate the NIS2 Regulation with Paul Conaty
Our Voice
CWSI Win Microsoft Compliance Partner of the Year 2024 in Ireland!
Learn why CWSI were awarded Microsoft Compliance Partner of the Year at the 2024 awards in this article. We discuss why this award is important to our business.
Our Voice
The Advantages of Partnering with a Member of Microsoft’s Intelligent Security Association (MISA)
Discover 6 key benefits of partnering with a member of Microsoft’s Intelligent Security Association (MISA), in this detailed blog from CWSI Security.
Podcast
Microsoft Security Hacks Podcast: Discover the Role of a CSOC
Listen to CWSI’s Mark Mitchell as he joins Microsoft’s Jeroen Jansen on the Microsoft’s Security Hacks Podcast as they discuss the role of a CSOC.
Our Voice
A Guide to Microsoft 365 E5 Security and Compliance Add-ons
Explore Microsoft 365 E5 Security with this detailed guide from CWSI Security. We discuss this software in full, as well as its compliance add-ons.
