BLOG

Peeling the onion

The concept of a Zero Trust Networking is gaining in popularity. However, many organisations still think of security as protecting the perimeter – complete with layered security technologies resembling the layers of an onion. However, moving from a legacy position to a more progressive approach to cyber security need not be a big-bang project. Instead, some organisations are embarking on more manageable phased transitions that move over key functions with little disruption and with...

Read More

BLOG

Reducing the security risks of mobile technology to improve patient care

It’s hard, if not impossible, to think of a time when more attention has been paid to healthcare. While the government and the National Health Service (NHS) throw every resource possible at meeting the demands of caring for those struck down with COVID-19, it’s also important to look at how general healthcare standards can be improved and made more efficient to ease the wider burden on care providers. By Stefan Spendrup, Vice President of Enterprise Mobility Northern and Western Europe at...

Read More

BLOG

The threat to and from your VPN Infrastructure

The early months of 2020 have changed how we think about our enterprise networks. Dial back a few months and many organisations assumed that the bulk of employee use of IT infrastructure was from campus and branch locations. Yes, remote access to corporate IT has been an accepted fact of life for some decades now and yes, many organisations had at least some of their workforce working remote to varying degrees. Also, the advent of cloud computing and Software-as-a-Service (SaaS) applications...

Read More

BLOG

The Lord of the Data: A cautionary tale

One dataset to rule them all, one team to find them. One tool to bring them all and the database bind them…. By Gordon Cullum, Chief Technology Officer at Mastek.

Read More

BLOG

Data virtualisation – the Chief Data Officer’s best friend

The rise of the Chief Data Officer (CDO) has been meteoric in recent years. Despite being one of the newest executive roles for many businesses, research suggests the number of companies hiring a CDO has more than quadrupled since 2012. With Dixons Carphone Warehouse and even the Welsh Government recently joining this figure, investment in the coveted position doesn’t look set to slow down anytime soon. By Alberto Pan, Chief Technical Officer at Denodo.

Read More

BLOG

Securing an ever-evolving platform: cybersecurity challenges in the cloud

Cybersecurity is a worry for cloud users. Market research company Vanson Bourne, in conjunction with Nutanix, found that 60 per cent of companies cite security as the biggest factor impacting future cloud strategies. Increasing complexity and evolving technology promise to exacerbate security worries for cloud users, but a strategic approach to security and partnerships can keep data and applications safe. By Craig Tavares, Head of Cloud, Aptum.

Read More

CyberArk survey findings show organisations are failing to secure privileged accounts and...
Splunk, in collaboration with Oxford Economics, has released a new global report "The Hidden Costs...
Cloudflare onboards enterprises under attack through Booz Allen collaboration, a fast track to...
A new study from Juniper Research has found that the total cost of software supply chain...
Key partnership with Zscaler accelerates customers’ zero trust journey.
Logpoint releases comprehensive new capabilities to its converged cybersecurity operations...
Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more