Read tips on the design process, overcoming resistance to change within IT, whether to stick with one or multiple service suppliers and how the SASE architecture can help.
Moving to a Cloud native WAN is not just about monthly cost savings. Read how other benefits, such as productivity and the end-user experience can be enhanced.
Remote working and multi-cloud initiatives are increasing, extending the network perimeter, making it harder to control access to sensitive data. Read how SD-WAN and SASE can be used to build a Zero Trust Network.
Security is frequently quoted as a reason to continue using MPLS. This blog discusses the pros and cons of MPLS in the move to cloud and web services and securing the WAN edge.
The enterprise infrastructure has changed considerably with organisations undertaking digital transformation projects. In this blog, we discuss the future of application delivery – from MPLS to cloud native infrastructure.
As AI becomes an important part of the legal industry, how can it help prevent sensitive data loss in Document Management Systems (DMS) through Machine Learning?
Darran Clare gives his view on the “Data Security and Protection” (DSP) toolkit and the additional opportunities and challenges it presents NHS organisations.
In the midst of COVID-19 and with many businesses adapting to more flexible and agile environments, how do we ensure security of information and how do businesses stay safe in the new data world?
Impact on the global supply chain during COVID-19 has led many businesses longing for more visibility and agility. But how will they create a risk ready supply chain that diversifies supplier regions and builds more agility into the relationships?
What are the options when your high-cost and long-life devices are running legacy operating systems? Organisations without significant capital investment to replace them are facing this reality, which has not gone unnoticed by cybercriminals.
Sensitive data in financial applications is extremely important to keep protected. For users of Xero, there is a free opportunity to utilise 2FA to effectively add a layer of protection. Watch our step-by-step video to learn how.
How can SECOPS teams be expected to effectively analyse, monitor, and improve an organisation’s security posture that extends to multiple environments, without proper data visibility being sent to existing tools?
Cyber threats exposed in May 2020 include multiple vulnerabilities in Google Chrome Browser and new phishing tactics taking advantage of Google Firebase and Microsoft Sway.
Threats and news this month include Microsoft postponing disabling basic authentication, the sectors most likely to fall for phishing attacks and fixes released for a critical vulnerability in VMware vCenter Server.
We discuss challenges we have seen when deploying Multi-Factor Authentication in organisations and how each of them can be assessed individually and resolved.
As anybody who’s ever configured and monitored a firewall, set up a SIEM programme or spent about 15 seconds in a SOC will tell you, modern security software generates a LOT of alerts and notifications.
Learn from 6 cyber threats in March. Topics this month include NCSC work from home guidance for IT administrator and Microsoft ending support of basic authentication for Office 365.
The FCA and the ICO have had a close relationship for many years. In February 2019, the FCA and the ICO released an updated Memorandum of Understanding, outlining a framework for stronger cooperation between the two parties.
Threats uncovered this month include a malicious email campaign taking advantage of Coronavirus concerns and a WordPress plugin with a critical vulnerability.
Learning from 6 focus business threats from January 2020 that you need to be vigilant for. Read our consolidated monthly threat summary.
Learning from 6 focus business threats from December 2019 that you need to be vigilant for. Read our consolidated monthly threat summary.