The Colonial Pipeline cyberattack in May 2021 ranks as one of the top critical infrastructure attacks to date. One year later, we talk with Sean Deuby at Semperis about the current state of infrastructure cybersecurity: the lessons learned and new threats emerging
Cybersecurity can feel a bit like navigating a minefield – while the ground is
constantly shifting beneath your feet. New technologies, evolving business needs
and an ever-expanding attack surface can mean securing all areas of a business
turns into a bit of a headache for organizations while they attempt to keep pace
with threats that are increasingly sophisticated and harder to predict.
Validity, the leading provider of data quality and email marketing success solutions, announced a data partnership with Red Sift, an integrated cloud email and brand protection platform.
Learn how Log4j has evolved to become LoNg4j and how it exposes the flaws in the digital supply chain
N-able, the solutions partner helping IT services providers deliver security, data protection, and remote monitoring and management services, today announced the launch of Cove Data Protection™, the cloud-first data protection-as-a-service (DPaaS) solution that modernizes data protection for business-class backup and disaster recovery.
38% of IT leaders believe the consolidation in the managed security service provider (MSSP) market, leading to cyber security-as-a-service (CSaaS) being commonplace, will be the sector’s biggest disruptor of the next five years, according to new research from Distology. Read what Lance Williams, Chief Product Officer at Distology has to say.
Here in the UK, CIAM is playing a central role in maintaining trusted relationships with consumers online. In fact, 78% of the 200 UK and Ireland respondents who took part in a recent WSO2 and Vanson Bourne research study said they are already using an identity and access management platform (IAM), with 67% utilizing a customer identity and access management platform (CIAM).
DigiCert, outlines its vision at the annual Security Summit to help customers manage trust across their digital footprint.
Tom Lawrence told a story of a time when he used to work in corporate at an organization that drove 92% of its revenue from Ford.
Working life has changed as we know it. The pandemic has acted as a catalyst for businesses to adopt a hybrid working model. This has, however, allowed successful cyberattacks to increase as businesses adapt and transition to the new normal. Andrea Babbs, UK General Manager, VIPRE, emphasises the importance for businesses to have complete all-round security, relying on technology augmented by human intervention.
Tencent Cloud provides a full suite of industry and technical solutions that fit a wide variety of business scenarios, ensuring that customers can move to the cloud securely and efficiently.
We interviewed 19 of the most relevant companies: Fujitsu, Acronis, D2IQ, Enlogic, Platform SH, Tencent Cloud, Dragos, App Gate, Total Data Centre Solutions, Incepteo, Canonical, Netskope, Cloud Q, Microsoft, Vertiv, Ionos, Mitsubishi, Ionos, Dragos
The most successful cloud transformations are enabled through co-creation
Appgate works hard to understand how cybercriminals operate so that it can build the best secure access solutions as a defense.
Netskope describes itself as the best-of-breed security product and made a bold statement that legacy systems simply won’t cut it for the cloud future
Martin Riley, Director of Managed Security Services at Bridewell tells us about zero-trust strategy and building a successful hybrid environment
Barry O’Donnell, Chief Operating Officer, TSG, looks at the need to prioritize evaluating risk levels in your cybersecurity business reports.
We look at the subjects covered in our monthly magazine, this month’s edition concentrates on the Metaverse and Cybersecurity.
Understanding how to implement a zero trust policy has become essential for all businesses
Mike Sentonas, CTO at CrowdStrike looks at the ransomware hacker’s toolkit and how it is vital that companies understand more about the modus operandi of cyber criminals.