BLOG

Moving from perimeter to Zero Trust security

As more organisations become reliant on cloud-based network services, the traditional perimeter-based security model is becoming increasingly outdated. Keeping security measures updated is crucial in preventing cracks within a network’s defence system, and the cracks in perimeter-based models can no longer be ignored. As Michael Murphy, deputy CTO at quantum-resistant encryption specialist Arqit, explains, it’s time for zero-trust.

Read More



VIDEO

Tool overload driving agent fatigue and missed threats

Adam Pitton, Heimdal Security cybersecurity advisor and former UK cyber detective, discusses the findings of the company’s recent survey 80 North American MSPs, showing that fragmented security stacks drive fatigue, missed threats, and business inefficiency. Security tools meant to protect managed service providers are instead overwhelming them. Adam explains what’s going wrong and what needs to happen in order to ensure that MSPs can make agent fatigue a thing of the past.

Read More

VIDEO

AI adoption prompts major cybersecurity adjustments

Mike Arrowsmith, CTO at NinjaOne, shares valuable insights into a number of cybersecurity issues, explaining how AI adoption itself isn’t problematic when done thoughtfully – but lack of cyber awareness in this context is a cause for concern; how traditional IT and security silos are collapsing as AI demands more collaboration across the enterprise; and how AI brings with it likely challenges around shadow IT. Mike also highlights some non-AI related cybersecurity topics, before sharing a...

Read More

VIDEO

Not just another vulnerability scanner!

Ian Schenkel, Chief Revenue Officer, Cyber Intelligence House (CIH), explains how the company’s intelligence-driven Cyber Exposure Platform is designed for MSSPs to deliver high margin, high value services without the overhead. Analysts scour the deep and dark web, tracking over 2,500 threat actors, nation states, and malware families to uncover customers' real cyber exposure - from rapid exposure assessments to continuous breach and malware monitoring, the white label solution provides MSSPs...

Read More

Zero trust technologies that enable seamless, secure user authentication are critical; 6 in 10...
Cloud defenders are gaining ground as the cloud landscape comes into focus, with 92% of...
71% of “novices” perceive the threat of security incidents to be growing over time, compared...
Malware, insecure networks, and remote access top list of concerns as organisations embracing home...
Javelin research “The State of Strong Authentication Report 2019” shows use of...
Logpoint introduces endpoint detection and remediation capabilities to its security operations...
Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more