The second edition of #PASS2019 highlighted the importance of analysis and continuous learning to tackle the new cyberattack formulas.
Read MoreNew data ranking the ‘cybermaturity’ of organisations reveals the most commonly targeted sectors are also the most prepared to deal with the ever-evolving threat landscape.
Read MoreIt’s no secret that IT has evolved and, as a result, so has our approach to cybersecurity. For example, focus has shifted from a purely preventative strategy to one that seeks to reduce the time to detect and mitigate a security incident. However, one thing that hasn’t received a lot of attention is our concept of the endpoint. The endpoint is no longer just the hardware devices connecting to the network, but the applications that users leverage to work with your organisation. By Chad...
Read MoreIT teams in organisations that have suffered security incidents in the past year often lacked executive support and had a limited budget.
Read MoreThe internet is disrupting industries and business models, fundamentally changing the way we live and work in the process. The cloud has also ignited a wave of disruption, which when considered in conjunction with the proliferation of mobile devices, has rendered traditional network and security best practices obsolete. By Yogi Chandiramani Technical Director for Zscaler EMEA.
Read MoreAccording to a new global survey fielded by the Business Performance Innovation (BPI) Network, in partnership with A10 Networks, mobile service providers anticipate significant new revenue opportunities from the coming deployment of high-speed 5G networks and a host of new IoT-driven use cases, but they also believe much-improved security will be essential to realising that potential.
Read More