Our Voice

What’s Changing in Azure AD B2C?

Learn More
CONTACT US

Resources

Our Voice

CWSI Partners with Hoxhunt to Revolutionise Cyber Security Training

Discover the partnership between CWSI and Hoxhunt and how it is transforming employee cyber security training.

Learn More

Our Voice

What is Microsoft Defender for Endpoint?

Learn More

Our Voice

Best Practices in Mobile App Security: Secure Your Customers Data

Our best practices for mobile device security. Learn how to protect your organisation from mobile threats with secure authentication, app management, and more.

Learn More

Our Voice

From Data to Defence: How the Threat Intelligence Lifecycle Strengthens Cybersecurity and Compliance

Discover how the threat intelligence lifecycle can help you strengthen your organisation’s cybersecurity and compliance capabilities in this detailed guide.

Learn More

Our Voice

What is Cloud Transformation? The Complete Guide

Discover what cloud transformation means, its benefits, and how CWSI helps businesses modernise IT systems and drive innovation through cloud solutions.

Learn More

Our Voice

The Complete Guide to Advanced Persistent Threats

Learn everything you need to know about Advanced Persistent Threats in this guide by CWSI. Get in touch today for more information.

Learn More

Our Voice

The Complete Guide to Cyber Threat Actors: Understanding and Defending Against Digital Threats

Learn all you need to know about Cyber Threat Actors in this detailed guide from CWSI. We discuss different actor groups, techniques and tactics.

Learn More

Our Voice

What is Microsoft Intune? A Detailed Guide

Discover what Microsoft Intune is, in this detailed guide from CWSI Security. We outline the benefits of this solution and how it can benefit your business.

Learn More

Our Voice

How to Navigate the NIS2 Regulation with Paul Conaty

Learn More

Our Voice

CWSI Win Microsoft Compliance Partner of the Year 2024 in Ireland!

Learn why CWSI were awarded Microsoft Compliance Partner of the Year at the 2024 awards in this article. We discuss why this award is important to our business.

Learn More

Our Voice

The Advantages of Partnering with a Member of Microsoft’s Intelligent Security Association (MISA)

Discover 6 key benefits of partnering with a member of Microsoft’s Intelligent Security Association (MISA), in this detailed blog from CWSI Security.

Learn More

Podcast

Microsoft Security Hacks Podcast: Discover the Role of a CSOC

Listen to CWSI’s Mark Mitchell as he joins Microsoft’s Jeroen Jansen on the Microsoft’s Security Hacks Podcast as they discuss the role of a CSOC.

Learn More

Our Voice

A Guide to Microsoft 365 E5 Security and Compliance Add-ons

Explore Microsoft 365 E5 Security with this detailed guide from CWSI Security. We discuss this software in full, as well as its compliance add-ons.

Learn More

Our Voice

What is an E-Skimming Attack?

Discover what an E-skimming attack is in this guide from CWSI. We define this type of attack, how they work and what options are available if you are hit by one.

Learn More

Our Voice

Microsoft 365 E5 Licence Explained

Learn More

Our Voice

Understanding Microsoft Purview: A Detailed Guide

Learn More

Our Voice

What Does a Threat Intelligence Analyst Do?

Discover what a Threat Intelligence Analyst does in this guide from CWSI. We discuss roles, responsibilities and what they can bring to the table.

Learn More

Our Voice

The Difference Between Microsoft 365 E3 and E5

Learn More

Our Voice

The History of Ransomware

Discover the history of ransomware in this detailed guide from CWSI. We discuss a range of cyber attacks including the original Trojan attack by Joseph Popp.

Learn More

Our Voice

A Guide to Vulnerability Intelligence

Learn More

Our Voice

What is Microsoft Azure B2B?

Read our Microsoft Azure B2B blog to learn its impressive benefits for external collaboration.

Learn More