What's going on

Stay up-to-date with the latest industry news, blog posts, and insights.

Placeholder for Metal dark surfaceMetal dark surface

Ransomware: The Digital Plague that Still Persists

Ransomware began its reign of cyber terror in 1989 and remains a serious and dangerous threat today. In layman’s terms, ransomware is malware that employs encryption to lock users out of their devices or block access to critical data or files.

1 min. read
Placeholder for 2025 Gartner Magic Quadrant for Enterprise LAN2025 Gartner Magic Quadrant for Enterprise LAN

Why 5G Security and Interoperability must not be optional extras

Mobile Solutions Architect Ditri Trio elaborates on 5G Security and Interoperability challenges with existing 3G and 4G networks.

1 min. read
Placeholder for Mcafee backgroundMcafee background
McAfee

McAfee Introduces CASB-Integrated Cloud Security Platform for Container-Based Applications

McAfee MVISION Cloud for Containers provides: Cloud Security Posture Management (CSPM), “Shift Left” DevOps Integration, Vulnerability Scanning of container images.

1 min. read
Placeholder for Juniper networks mx seriesJuniper networks mx series
Juniper Networks

Routing Juniper Networks

Juniper incorporates Security Intelligence to MX Series Routers

Juniper Networks incorporates Juniper Networks’ security intelligence onto the MX Series routers. Security can be extended to routing infrastructure to turn connectivity layers into automated defense layers at scale.

1 min. read
Placeholder for Glass architectureGlass architecture
McAfee

Cloud security

19 cloud security best practices for 2019

Mitigate risks to using any cloud service with these Cloud Security Best Practices. Cloud computing has become near-ubiquitous, with roughly 95 percent of businesses reporting that they have a cloud strategy.

11 min. read
Placeholder for Ceiling light structureCeiling light structure
McAfee

McAfee named Leader in Forrester WAVE Cloud Workload Security report

McAfee has been named a leader by indepentent research firm Forrester in its first WAVE report on Cloud Workload Security (CWS).

1 min. read

DMARC email authentication - how UK law firms are protecting clients, data and insurance premiums

DMARC (domain-based messaging, authentication, reporting and conformance) is a globally-recognised industry standard that authenticates an email sender ensuring that a hacker cannot impersonate the law firm’s domain, and thus commit email fraud. DMARC is one of the minimum cyber security standards required by the British Government of all departments and their contractors.

1 min. read
Placeholder for Modern bridge emiratesModern bridge emirates
Juniper Networks

Juniper Networks

Juniper Networks Expands Enterprise Portfolio with Cloud-Managed SD-LAN and CPE Devices

NFX350, SRX380 and other new enhancements bring cloud agility and scale to more parts of the enterprise network, while lowering the cost of deploying and operating SD-Branch environments.

1 min. read
Placeholder for Office buildingsOffice buildings
Palo Alto Networks

Cybersecurity

Budgeting for cybersecurity: Are you doing it right?

For CISOs and cybersecurity teams in your organisation, every action and investment should be made with the goal of mitigating risk.

1 min. read
Placeholder for Digital identityDigital identity
CrowdStrike

CrowdStrike

Crowdstrike gets highest rating in Gartner's Customer’s Choice for Endpoint Protection Platforms

As on of the best endpoint protection platforms in 2019, Crowdstrike now received the Gartner Customer’s Choice with the highest overall rating (4.9 out of 5) among endpoint security vendors.

1 min. read
Placeholder for Office glass frontOffice glass front

Cloud security

Defining cloud security – Is it the endpoint, your data, or the environment?

“Secure the cloud.” What does that phrase mean? On the surface, it’s easy to assume this phrase means using cloud-enabled security products. However, it’s much more than that. Cloud security is about securing the cloud itself through a combination of procedures, policies, and technologies that work together to protect the cloud.

1 min. read
Placeholder for Tunnel traffic nightTunnel traffic night

Rapid international expansion thanks to specialisation

Interview with Infradata Group CEO Nino Tomovski. About the international growth of Infradata Group, Cyber ​​Security solutions and the importance of local expertise.

1 min. read
Placeholder for Palo alto networksPalo alto networks
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks acquires Aporeto for cloud security

Palo Alto Networks announced that it has entered into a definitive agreement to acquire Aporeto Inc.

1 min. read
Placeholder for Elevator shaftElevator shaft
Juniper Networks

Juniper Networks Achieves Recommended Rating from NSS Labs for Data Center Security Gateway

Juniper Networks has achieved a “Recommended” rating from NSS Labs in this year's Data Center Security Gateway (DCSG) report. NSS Labs tested a Juniper SRX5400 firewall with one SPC3 service card, running Application Security and Intrusion Detection Prevention (IDP).

1 min. read
Placeholder for Colourful leaves macroColourful leaves macro
Arbor Networks

NetOps, SecOps, and DevOps: Merger material?

DevOps are critical to companies aiming to feed the insatiable appetites of today’s digital economy. At the same time, NetOps teams race to deliver flawless performance—in real time—across an ever-more complex environment of data centers, cloud, and virtualized environment.

1 min. read
Placeholder for Juniper nxtwork2018 las vegasJuniper nxtwork2018 las vegas

Juniper Networks

The week after: Key takeaways from Juniper NXTWORK 2019

Key takeaway from NXTWORK 2019, the annual Juniper Networks event, including: AI driven enterprise networks, Mist Systems' Marvis, threat aware networks and more.

1 min. read
Placeholder for Business woman 1Business woman 1
Fortinet

Using Advanced AI to Stay Ahead of Cybercriminals

As the threat landscape continues to evolve rapidly, it now includes increasingly sophisticated, zero-day malware that traditional security approaches can no longer keep pace with. As a result, security researchers estimate that the cost of cybercrime will outpace security spend by over 16X

1 min. read
Placeholder for Coffee meetingCoffee meeting
McAfee

Endpoint security

Maintaining effective endpoint security

With the threat landscape evolving every day, is there more these organizations can do to sustain an effective endpoint strategy while supporting enterprise expansion? Let’s take a look at how teams can bolster endpoint security strategy.

5 min. read

Sign up for our newsletter

Get the latest security news, insights and market trends delivered to your inbox.