Monday, 13th July 2020
BLOG

Zero Trust – security in times of agility

The COVID-19 pandemic has forced businesses into operating under a “new norm” where the working from home (WFH) model has quickly become the recommended and preferred approach. Indeed, the COVID-19 pandemic is forcing organizations to transform how they conduct business, albeit in a very rapid way. By Shehzad Merchant, Chief Technology Officer at Gigamon.

Read More

BLOG

Fighting cryptosloth and getting to quantum safety

Quantum is coming as a powerful challenge to cryptography and all of the information modern encryption keeps safe. Many understand that but view it as a distant threat. What they don’t realise is how far they’ll have to go to prepare for it. By Tim Hollebeek, Industry and Standards Technical Strategist, DigiCert.

Read More

BLOG

Peeling the onion

The concept of a Zero Trust Networking is gaining in popularity. However, many organisations still think of security as protecting the perimeter – complete with layered security technologies resembling the layers of an onion. However, moving from a legacy position to a more progressive approach to cyber security need not be a big-bang project. Instead, some organisations are embarking on more manageable phased transitions that move over key functions with little disruption and with appropriate i...

Read More

BLOG

Reducing the security risks of mobile technology to improve patient care

It’s hard, if not impossible, to think of a time when more attention has been paid to healthcare. While the government and the National Health Service (NHS) throw every resource possible at meeting the demands of caring for those struck down with COVID-19, it’s also important to look at how general healthcare standards can be improved and made more efficient to ease the wider burden on care providers. By Stefan Spendrup, Vice President of Enterprise Mobility Northern and Western Europe at SOTI...

Read More

BLOG

The threat to and from your VPN Infrastructure

The early months of 2020 have changed how we think about our enterprise networks. Dial back a few months and many organisations assumed that the bulk of employee use of IT infrastructure was from campus and branch locations. Yes, remote access to corporate IT has been an accepted fact of life for some decades now and yes, many organisations had at least some of their workforce working remote to varying degrees. Also, the advent of cloud computing and Software-as-a-Service (SaaS) applications lik...

Read More

BLOG

The Lord of the Data: A cautionary tale

One dataset to rule them all, one team to find them. One tool to bring them all and the database bind them…. By Gordon Cullum, Chief Technology Officer at Mastek.

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more