Blog

Micro-segmentation and the Zero Trust Model

Traditional Perimeter Methods Are Not Enough

For organisations with perimeter-based security, a breach gives malicious actors access to your entire network, enabling them to move laterally to wherever they want as soon as they breach defences.  This security model sees all applications and data equally and therefore security and access is the same for everything. 

more →

Blog

Adaptability And Resilience Will Remain Key For Cybersecurity In 2021

In 2020, breaches were the digital pandemic. Cybercriminals were provided with the opportunity to disrupt and target the weak areas of organizations that were not prepared to work remotely securely.

It is certainly true to say that we are all glad to see the back of 2020. But not withstanding these difficult and challenging times, what does the cybersecurity landscape look like in 2021?

more →

Blog

Tackle the Data Deluge Problem for Better Cybersecurity

This month we are sharing a blog from our partner eSentire that takes a look at how artificial intelligence and machine learning can help you deal with data security.

Tap AI and ML to scan security and threat logs as part of a two-pronged approach to security and threat detection

We’re now in a machine-scale world, where the scale, complexity and dynamism of data exceeds human capacity to keep up with it.

more →

Blog

Recursive DNS – Does Your Organization Have A Security Blind Spot?

This month we share another blog from our technology partner Akamai on the topic of recursive DNS. Targeted threats such as malware, ransomware, data exfiltration, and phishing are increasing in volume yet many organizations have a blind spot when it comes to the Domain Name System (DNS).

Although every action on the Internet relies on recursive DNS, many security organizations fail to install corresponding safeguards.

more →

Blog

Zero Trust – Are VPNs A Thing Of The Past?

In a business world that is facing an ever-increasing and intensifying threat landscape, enterprises must re-evaluate their current perimeter security approach. This month we are sharing a blog from one of the pioneers of the “Zero Trust” mentality, Akamai. We take a look at how VPNs are out of date and why we should all be adopting the ‘never trust, always verify’

more →