Network
Sparkle launches SASE Connect for the security of international corporate networks
Sparkle, one of the first international service providers in Italy and among the top global operators, announces the launch of SASE Connect to improve the security of international corporate networks. The increasing adoption of remote working and the growing migration of business applications to...
Four strategies for making the network safer
Adrian Taylor, Regional VP of Sales at A10 Networks, discusses the key considerations cybersecurity leaders should include in their business strategy to ensure they protect the network and guarantee digital safety. CSOs, CIOs and CISOs have never had it so tough. Alongside their traditional...
Forescout’s Vedere Labs reveals the riskiest connected devices in enterprise networks
Forescout’s Vedere Labs has unveiled research into the riskiest IT, IoT, OT and IoMT devices across enterprise networks. The research uncovers what makes them so risky and how to mitigate cyber-risks affiliated with them. The growing number and diversity of connected devices in every...
IoT and OT security: The challenges, benefits and why you should care
As digitisation ramps up, industry leaders are utilising IoT technology more frequently. Paul Keely, Chief Cloud Officer at Open Systems, discusses this in further detail; explaining what IoT and OT is, as well as drawing our attention to the importance of understanding the most significant...
Features
Nuance voice biometrics to boost security at Santander
Nuance Communications, has announced Santander is making phone banking more seamless and secure through Voice ID, a system that leverages...
Password protection: Tips on how to secure the ‘keys to the kingdom’
Research from LastPass by LogMeIn, a leader in password management, has revealed that while businesses are making strides in...
CyberArk expert on securing the paperless health service
The increased use of electronic personal information, coupled with rapid advances in healthcare technology, has created complex...
Insights
Cybersecurity predictions: Identity protection to be a priority in 2022
Every year, IT and cybersecurity firms round up their predictions on their expectations for the immediate future. While predictions have...
Seven strategies for CSO cybersecurity survival
As the CSO is tasked with more complex challenges as threats become more sophisticated, they must create a robust cybersecurity model for...
How to communicate DDoS threats to the board
Executive boards need to understand the severity of potential DDoS attacks to their company networks and prepare accordingly. Ashley...
Proactively preventing cyberattacks and keeping the business operational with threat hunting
Sameer Basha, Security Consultant GCC, Check Point Software Technologies – Middle East, discusses the importance of using threat...
Case Studies
Infosys deploys RSA solutions to protect and manage extensive global infrastructure
IT giant, Infosys, has half a dozen strategic partners it relies on to deliver key components of its security stack. Executives from the...