What's going on

Stay up-to-date with the latest industry news, blog posts, and insights.

Placeholder for Team discussionTeam discussion
Fortinet

Security Multi-cloud

Overcoming security challenges impacting multicloud environments

Cloud adoption is increasing at a rapid pace as organizations look for new ways to process, store, and distribute information. For many organizations, deploying new cloud services is much easier than requesting a dedicated set of hardware from IT teams.

1 min. read
Placeholder for Street by night3Street by night3
Juniper Networks

Juniper Networks introduces Contrail Insights

Juniper Networks Contrail Insights enhances full stack data center monitoring and automation with single pane of glass visibility.

1 min. read
Placeholder for Under the bridgeUnder the bridge

Legacy laggards or transformation champions

Digital transformation is the new reality for all organisations, and the legal sector is no exception. How are law firms in the UK navigating the journey, and what are they doing to ensure that the opportunities digital delivers aren’t compromised by a lacklustre IT security stance?

1 min. read
Placeholder for Management meetingManagement meeting

A beginner’s cybersecurity guide for board members

Cybersecurity for a board member or business executive, starts by getting acquainted with the CIS Controls, commonly referred to as the CIS 20, says M.K. Palmore of Palo Alto Networks

1 min. read
Placeholder for Northern lightNorthern light
McAfee

Cybersecurity

Cybersecurity Platforms: 8 Must-Have Attributes

Eight key attributes that should be included in all RFIs/RFPs and become part of every cybersecurity technology platform.

1 min. read
Placeholder for DatacenterDatacenter
Cumulus Networks

Cumulus Networks Extends Data Center Innovation to Modernize Campus Networks

Cumulus Networks and Dell EMC extend joint benefits of open networking to campus networks and enable a single network OS across data center and campus environments.

1 min. read
Placeholder for Digital identityDigital identity

Top 5 mobile security threats and how to mitigate them

Some of the biggest mobile security threats companies are seeing recently include: phishing, mobile malware, fake public Wi-Fi connections, malicious apps and data leaks.

1 min. read
Placeholder for Runner street shimmerRunner street shimmer

Data breach response plan: best practices in 2019

Data breach response plan best practices, enabling companies to retain business, customers, and shift brand perception in the market.

1 min. read
Placeholder for Green snakeGreen snake

Email security

Decoding Email Security

Email Security expert blog by Kunal Biswas: Email is one of the most popular communication mediums for organisations today. It  is also the most prominent attack vector. Emails are being accessed using multiple devices, from different locations, shaping a 'converged device landscape' for email use.

1 min. read
Placeholder for Bismuth gemstoneBismuth gemstone

Cybersecurity

Cybersecurity in 2020: A new dawn

What lies ahead in the near future for cyber security? What can we expect? In this blog I'll attempt to answer what cyber security might look like in 2020.

1 min. read
Placeholder for Shark fish schoolShark fish school

The dark side of governments: A growing threat of APT groups

For most nation states, covert advanced persistent threat (APT) groups are an equally valuable tool that operate in the shadows, stealing data, disrupting operations, or destroying the infrastructure of targeted enemies.

1 min. read
Placeholder for Milkyway lakesMilkyway lakes

Network security

Top 5 Network Security Solutions and Technologies

The 5 best Network security solutions and technologies that help define and guarantee business success. Unfortunately many enterprises do not know what network security solutions are essential to securing their network and data.

1 min. read
Placeholder for Partial view of woman using laptopPartial view of woman using laptop

Endpoint security EDR

5 Endpoint Security Best Practices

Your Cyber Security strategy should include Endpoint Security, as it is one of the most critical components for network security. In this article, our experts sum up Endpoint Security best practices for the Enteprise.

1 min. read
Placeholder for Fortinet firewallFortinet firewall
Fortinet

Fortinet Wins SE Labs Best Network Security Appliance Award

Fortinet has been awarded the Best Network Security Appliance award from SE Labs – one of the most respected labs in the testing community. SE Labs has been testing FortiGate products for the past three years, and in addition to this accolade, have awarded a AAA rating to the FortiGate solution for the third year in a row.

1 min. read
Placeholder for City reflectionsCity reflections
McAfee

McAfee acquires container security startup NanoSec

McAfee, announced the acquisition of NanoSec, a multi-cloud, zero-trust application and security platform. The acquisition will enable organizations to improve governance and compliance and to reduce risk of their cloud and container deployments.

1 min. read
Placeholder for Runner street shimmerRunner street shimmer
CrowdStrike

CrowdStrike Endpoint security

CrowdStrike Positioned as a Magic Quadrant “Leader” for Endpoint Protection Platforms 2019

Crowdstrike is positioned as a “Leader” in the 2019 Gartner Magic Quadrant for Endpoint Protection Platforms (EPP). This recognition from Gartner is the first time Crowdstrike has been placed in the Leaders Quadrant with their Crowdstrike Falcon Endpoint Protection Platform.

1 min. read
Placeholder for Wide angle sky line blueWide angle sky line blue

3 things we can learn from the Monzo PIN code breach

Earlier this week popular new UK challenger bank Monzo announced via its blog that they had been incorrectly storing approximately 20% of their users PIN numbers due to the way the system was designed when you performed a couple of different actions within their app.

1 min. read
Placeholder for Glass reflectionsGlass reflections

Cloud app security in a direct-to-cloud world

There are a few more things to think about when considering direct-to-cloud connectivity: How it impacts cloud application usage and organizational security.

3 min. read

Sign up for our newsletter

Get the latest security news, insights and market trends delivered to your inbox.