Zero-Trust
The password problem
What do these numbers and letters have in common? 123456, 123456789, picture1, password, 12345678, 111111.
Rachid Groeneveld
OT security
Top five OT security threats
These OT security threats provide an overview of critical and most common cyber threats to Operational Technology.
TEHTRIS Cybersecurity
Protect your strategic data against industrial cyber-espionage
To prevent industrial cyber-espionage it is important to identify the risks (human, hardware, software), prevent and detect and hinder.
Problem management ITIL
Problem management: tools cannot give you wisdom
As long as there are no tools that think for us, problem management will largely be a human activity, where the combination of technical skills and soft skills is greater than ever.
Tom Jansen
Cisco
CVE security & management: vulnerability management by Cisco Kenna Security
Kenna Security's technology focuses on the different risks in order to better understand vulnerability management by prioritising them in order of importance.
Nicolas Tarenne
Mist AI Enterprise networking
Back to the office with a strong Wi-Fi connection
With hybrid working, the use of workstations is becoming increasingly flexible. One consequence is that the existing Wi-Fi network is more heavily loaded than before. Is the network ready for this?
Managed services SOC
5 reasons to consider a managed SOC service provider
When dealing with security threats, organisations could opt for a managed SOC (Security Operations Center). We provide five managed SOC service provider benefits.
Erik Biemans
ITIL
Why ITIL can be applied at any level
Many organisations struggle with a proper ITIL implementation. But this best practice offers a range of solutions that can partly be implemented at one's own discretion.
Tom Jansen
Zero-Trust Palo Alto Networks
Why Zero Trust is essential in a post-pandemic world
The rapid transformation to hybrid work and hybrid networks/clouds has exposed weaknesses in the first ZTNA approaches in this post-pandemic world.
Kumar Ramachandran from Palo Alto
OT security Fortinet
Global OT and cybersecurity report outlines key challenges for industrial organisations
Fortinet released the 2022 State of Operational Technology and Cybersecurity Report. The global report highlights the current state of OT security and provides a roadmap to better secure OT organisations.
Cisco Firewall
SecureX and Secure Firewall: Integration and automation to simplify security
New integrations between SecureX and Secure Firewall streamline processes and increase automation to simplify your security.
Aditya Sankar from Cisco
Trellix XDR
Cyber readiness & XDR: Progress, challenges & opportunities
Trellix pays particularly close attention to how EDR and XDR are being implemented across the public and private sectors.
Cloud security
Forcepoint's vision of converged and engaged security
Forcepoint's vision of converged security delivers converged network, web and application security services in the cloud and native data protection for a more modern cyber security infrastructure to globally distributed organisations.
Vincent Guillot
WAF F5 Networks
WAF technology needs to adapt now that apps are increasingly distributed
As workload deployments expand across diverse environments and app architectures, organisations want to be able to enforce consistent security controls across all applications, anywhere.
Frank Kyei-Manu from F5
Zero-Trust ZTNA
ZTNA 1.0 vs ZTNA 2.0
ZTNA 2.0 provides a new era of secure access. It solves trust problems by removing implicit trust to help ensure organisations are properly secured.
Cybersecurity
Tips to stay cybersafe during your travels
Are you going on vacation or travelling for work? Make sure all your devices stay cybersafe during your travels. We give you tips on how to do this.
Jonas Walker from Fortinet
Cisco
Cisco Catalyst switches get Meraki cloud management
Cisco is taking a major step toward bringing a full cloud-managed enterprise networking solution to market by connecting its Catalyst switching and wireless hardware to the Meraki dashboard.
Zero Touch Provisioning Juniper Networks
Case study: Using Juniper Zero Touch Provisioning with Raspberry PI 4
With Zero Touch Provisioning (ZTP) you can automatically provision new Juniper Networks devices in your network with very little manual interaction. In this case study, we discuss the use of Raspberry PI as an FTP and DHCP server.
Eslam Eid Hassan
Sign up for our newsletter
Get the latest security news, insights and market trends delivered to your inbox.