Network management
Top 5 reasons to outsource network management
Network management is probably one of the most important components when mapping your organisation's IT infrastructure. Outsourcing is a great way to free up your internal IT team to focus on day-to-day operations and strategic goals.
Alix Ingram
Network automation
Wifi networks and the rise of ai
Wi-Fi has been undergoing major changes recently, partly due to working from home. We compare 4 major Wi-Fi vendors and the use of AI.
Cyber attacks Cloud security
Top cybersecurity threats to be aware of
Cybersecurity threats are part of everyday life, such as attacks on IoT, phishing scams and ransomware attacks. Make sure your business is safe from these threats.
Zero-Trust
The password problem
What do these numbers and letters have in common? 123456, 123456789, picture1, password, 12345678, 111111.
Rachid Groeneveld
OT security
Top five OT security threats
These OT security threats provide an overview of critical and most common cyber threats to Operational Technology.
TEHTRIS Cybersecurity
Protect your strategic data against industrial cyber-espionage
To prevent industrial cyber-espionage it is important to identify the risks (human, hardware, software), prevent and detect and hinder.
Problem management ITIL
Problem management: tools cannot give you wisdom
As long as there are no tools that think for us, problem management will largely be a human activity, where the combination of technical skills and soft skills is greater than ever.
Tom Jansen
Cisco
CVE security & management: vulnerability management by Cisco Kenna Security
Kenna Security's technology focuses on the different risks in order to better understand vulnerability management by prioritising them in order of importance.
Nicolas Tarenne
Mist AI Enterprise networking
Back to the office with a strong Wi-Fi connection
With hybrid working, the use of workstations is becoming increasingly flexible. One consequence is that the existing Wi-Fi network is more heavily loaded than before. Is the network ready for this?
Managed services SOC
5 reasons to consider a managed SOC service provider
When dealing with security threats, organisations could opt for a managed SOC (Security Operations Center). We provide five managed SOC service provider benefits.
Erik Biemans
ITIL
Why ITIL can be applied at any level
Many organisations struggle with a proper ITIL implementation. But this best practice offers a range of solutions that can partly be implemented at one's own discretion.
Tom Jansen
Zero-Trust Palo Alto Networks
Why Zero Trust is essential in a post-pandemic world
The rapid transformation to hybrid work and hybrid networks/clouds has exposed weaknesses in the first ZTNA approaches in this post-pandemic world.
Kumar Ramachandran from Palo Alto
OT security Fortinet
Global OT and cybersecurity report outlines key challenges for industrial organisations
Fortinet released the 2022 State of Operational Technology and Cybersecurity Report. The global report highlights the current state of OT security and provides a roadmap to better secure OT organisations.
Cisco Firewall
SecureX and Secure Firewall: Integration and automation to simplify security
New integrations between SecureX and Secure Firewall streamline processes and increase automation to simplify your security.
Aditya Sankar from Cisco
Trellix XDR
Cyber readiness & XDR: Progress, challenges & opportunities
Trellix pays particularly close attention to how EDR and XDR are being implemented across the public and private sectors.
Cloud security
Forcepoint's vision of converged and engaged security
Forcepoint's vision of converged security delivers converged network, web and application security services in the cloud and native data protection for a more modern cyber security infrastructure to globally distributed organisations.
Vincent Guillot
WAF F5 Networks
WAF technology needs to adapt now that apps are increasingly distributed
As workload deployments expand across diverse environments and app architectures, organisations want to be able to enforce consistent security controls across all applications, anywhere.
Frank Kyei-Manu from F5
Zero-Trust ZTNA
ZTNA 1.0 vs ZTNA 2.0
ZTNA 2.0 provides a new era of secure access. It solves trust problems by removing implicit trust to help ensure organisations are properly secured.
Sign up for our newsletter
Get the latest security news, insights and market trends delivered to your inbox.