
A beginner’s cybersecurity guide for board members
Cybersecurity for a board member or business executive, starts by getting acquainted with the CIS Controls, commonly referred to as the CIS 20, says M.K. Palmore of Palo Alto Networks

Cybersecurity
Cybersecurity Platforms: 8 Must-Have Attributes
Eight key attributes that should be included in all RFIs/RFPs and become part of every cybersecurity technology platform.

Cumulus Networks Extends Data Center Innovation to Modernize Campus Networks
Cumulus Networks and Dell EMC extend joint benefits of open networking to campus networks and enable a single network OS across data center and campus environments.

Top 5 mobile security threats and how to mitigate them
Some of the biggest mobile security threats companies are seeing recently include: phishing, mobile malware, fake public Wi-Fi connections, malicious apps and data leaks.

Data breach response plan: best practices in 2019
Data breach response plan best practices, enabling companies to retain business, customers, and shift brand perception in the market.

Email security
Decoding Email Security
Email Security expert blog by Kunal Biswas: Email is one of the most popular communication mediums for organisations today. It is also the most prominent attack vector. Emails are being accessed using multiple devices, from different locations, shaping a 'converged device landscape' for email use.

Cybersecurity
Cybersecurity in 2020: A new dawn
What lies ahead in the near future for cyber security? What can we expect? In this blog I'll attempt to answer what cyber security might look like in 2020.

The dark side of governments: A growing threat of APT groups
For most nation states, covert advanced persistent threat (APT) groups are an equally valuable tool that operate in the shadows, stealing data, disrupting operations, or destroying the infrastructure of targeted enemies.

Network security
Top 5 Network Security Solutions and Technologies
The 5 best Network security solutions and technologies that help define and guarantee business success. Unfortunately many enterprises do not know what network security solutions are essential to securing their network and data.

Endpoint security EDR
5 Endpoint Security Best Practices
Your Cyber Security strategy should include Endpoint Security, as it is one of the most critical components for network security. In this article, our experts sum up Endpoint Security best practices for the Enteprise.

Fortinet Wins SE Labs Best Network Security Appliance Award
Fortinet has been awarded the Best Network Security Appliance award from SE Labs – one of the most respected labs in the testing community. SE Labs has been testing FortiGate products for the past three years, and in addition to this accolade, have awarded a AAA rating to the FortiGate solution for the third year in a row.

McAfee acquires container security startup NanoSec
McAfee, announced the acquisition of NanoSec, a multi-cloud, zero-trust application and security platform. The acquisition will enable organizations to improve governance and compliance and to reduce risk of their cloud and container deployments.

CrowdStrike Endpoint security
CrowdStrike Positioned as a Magic Quadrant “Leader” for Endpoint Protection Platforms 2019
Crowdstrike is positioned as a “Leader” in the 2019 Gartner Magic Quadrant for Endpoint Protection Platforms (EPP). This recognition from Gartner is the first time Crowdstrike has been placed in the Leaders Quadrant with their Crowdstrike Falcon Endpoint Protection Platform.

3 things we can learn from the Monzo PIN code breach
Earlier this week popular new UK challenger bank Monzo announced via its blog that they had been incorrectly storing approximately 20% of their users PIN numbers due to the way the system was designed when you performed a couple of different actions within their app.

Cloud app security in a direct-to-cloud world
There are a few more things to think about when considering direct-to-cloud connectivity: How it impacts cloud application usage and organizational security.

Network security Enterprise networking
Top 5 Key Challenges for Network Security
We have compiled a list of key challenges regarding network security and cyberthreats, as numerous companies and governments are taking measures to ensure privacy and maintain security by preventing cyberattacks. Nevertheless, cybersecurity remains a constant and ongoing issue of considerable concern.

DDoS Attacks Growing Ever-More Sophisticated and Efficient
DDoS attacks in 2019 remain some of the most prevalent. Research of Forbes reports that there were 2,216 data breaches and more than 53,000 cyber security incidents in March 2018.

Juniper Networks named Leader in Gartner's Magic Quadrant 2019 for Data Center Networking
Infradata Partners Juniper Networks, Cisco and Arista Networks are named a Leader in Gartner’s Magic Quadrant 2019 for Data Center Networking
Sign up for our newsletter
Get the latest security news, insights and market trends delivered to your inbox.