A WAF, standing for a Web Application Firewall, serves the purpose of protecting one or more web applications from being breached. They are widely deployed amongst businesses to help keep company records and customer information secure. Gartner notes that customers characterised WAFs as regularly being ‘frustrating’ and ‘a disappointment’. As the web becomes more complex, it’s becoming increasingly difficult for hardware vendors to meet existing and evolving requirements, such as moving web applications to cloud infrastructure (IaaS).more →
This month we share another blog from our technology partner Akamai on the topic of recursive DNS. Targeted threats such as malware, ransomware, data exfiltration, and phishing are increasing in volume yet many organizations have a blind spot when it comes to the Domain Name System (DNS).
Although every action on the Internet relies on recursive DNS, many security organizations fail to install corresponding safeguards.more →
In a business world that is facing an ever-increasing and intensifying threat landscape, enterprises must re-evaluate their current perimeter security approach. This month we are sharing a blog from one of the pioneers of the “Zero Trust” mentality, Akamai. We take a look at how VPNs are out of date and why we should all be adopting the ‘never trust, always verify’more →
The world’s top three cloud services providers, Amazon Web Services, Microsoft Azure and Google Cloud (GCP) have all announced compliance with GDPR. But imagine a world where you can view all your geo-located online instances and protected assets across multiple public cloud platforms – all within a single user-friendly portal.more →
This month we are sharing a blog from our technology partner Akamai on the “Zero Trust” philosophy, a concept first coined by analysts at Forrester Research. Given the impact of several high-profile malware outbreaks, exploits and hacks over the past year, a key disruptor in 2018 is the re-emergence of the zero trust security model.more →
This month we are publishing a blog from cloud security partner, Zenedge. Here, we explore the evolution of the security threat landscape, from threat actors improving their hacking techniques to the increasingly daunting task of protecting public-facing web applications and API endpoints. Not only do organizations need to get to grips with reality and understand they are under attack nearly 100 percent of the time, they must also come to terms with the fact that their current approach to defending their applications and APIs is woefully deficient.more →
This month we share a blog from our Technology Partner Enghouse Systems on their 2018 Contact Centre Predictions.
How are Contact Centres going to evolve over the year? Will there be more focus on automation and self-service solutions? A change in the way we handle customer interactions?
The role of the contact centre agent will continue to evolve
We expect to see ongoing investment by businesses in self-service and automation solutions during 2018.more →
What will happen in cyberspace in 2018? How will technology impact the real world over the next year? To kick off 2018, we are sharing a cybersecurity predictions blog from technology partner Radware.
2016 was the Year of DDoS. 2017 was the Year of Ransom. Can we assess leading indicators of new attack techniques and motivations to predict what 2018 will bring?more →