BLOG

Six Essential ‘Cyber Stack’ Ingredients

By Eric Herzog, CMO at Infinidat.

Read More

BLOG

AI and the rise of the autonomous SOC

By Martin Jakobsen, Managing Director, Cybanetix.

Read More

BLOG

It’s time to move on from outdated security training

By Masha Sedova, Vice President of Product Management, Human Risk, Mimecast.

Read More

BLOG

Moving from perimeter to Zero Trust security

As more organisations become reliant on cloud-based network services, the traditional perimeter-based security model is becoming increasingly outdated. Keeping security measures updated is crucial in preventing cracks within a network’s defence system, and the cracks in perimeter-based models can no longer be ignored. As Michael Murphy, deputy CTO at quantum-resistant encryption specialist Arqit, explains, it’s time for zero-trust.

Read More

VIDEO

Tool overload driving agent fatigue and missed threats

Adam Pitton, Heimdal Security cybersecurity advisor and former UK cyber detective, discusses the findings of the company’s recent survey 80 North American MSPs, showing that fragmented security stacks drive fatigue, missed threats, and business inefficiency. Security tools meant to protect managed service providers are instead overwhelming them. Adam explains what’s going wrong and what needs to happen in order to ensure that MSPs can make agent fatigue a thing of the past.

Watch now

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more
Significant increase in cyber activity putting further strain on stretched IT teams, particularly...
LogRhythm’s NextGen SIEM Platform provides rapid detection, response and neutralization of...
“Everything shortage” this holiday season – creating perfect catalyst for cyber threats to...
Hexaware Technologies acquires CyberSolve, a leader in identity and access management, promising...
Hackers exploit lack of IT investment to target scientific, medical, economic and defence research.
New report from Tessian and the Ponemon Institute reveals that email has become the riskiest...