<img src="https://secure.leadforensics.com/133892.png" alt="" style="display:none;">

Cloud security: tackling identity & access management with automation

Identity based threats make up the bulk of cyber risk today. This blog looks at how automation...

4 mins read Read More

Breaking down the upcoming EU NIS2 legislation

Explaining the upcoming EU NIS2 Directive and Cybersecurity legislation and requirements for...

4 mins read Read More

How to stay compliant with SOX requirements on Microsoft Dynamics 365

SOX requirements are one of the many requirements that businesses need to keep track of, but...

6 mins read Read More
Newsletter Subscribe
Subscribe to releases from Columbus Global

Subscribe to all the latest releases from Columbus Global by registering your e-mail address below. You can unsubscribe at any time.

The 4 security challenges businesses cannot ignore & how to navigate them

In this post, we’re going to take a look at the four most significant security challenges...

4 mins read Read More
right-arrow share search phone phone-filled menu filter envelope envelope-filled close checkmark caret-down arrow-up arrow-right arrow-left arrow-down