Blog

The WAF Market Is Broken – Should You Care?

Max Pritchard

A WAF, standing for a Web Application Firewall, serves the purpose of protecting one or more web applications from being breached. They are widely deployed amongst businesses to help keep company records and customer information secure. Gartner notes that customers characterised WAFs as regularly being ‘frustrating’ and ‘a disappointment’. As the web becomes more complex, it’s becoming increasingly difficult for hardware vendors to meet existing and evolving requirements, such as moving web applications to cloud infrastructure (IaaS).

more →

Blog

Recursive DNS – Does Your Organization Have A Security Blind Spot?

This month we share another blog from our technology partner Akamai on the topic of recursive DNS. Targeted threats such as malware, ransomware, data exfiltration, and phishing are increasing in volume yet many organizations have a blind spot when it comes to the Domain Name System (DNS).

Although every action on the Internet relies on recursive DNS, many security organizations fail to install corresponding safeguards.

more →

Blog

Zero Trust – Are VPNs A Thing Of The Past?

In a business world that is facing an ever-increasing and intensifying threat landscape, enterprises must re-evaluate their current perimeter security approach. This month we are sharing a blog from one of the pioneers of the “Zero Trust” mentality, Akamai. We take a look at how VPNs are out of date and why we should all be adopting the ‘never trust, always verify’

more →

Blog

How To Achieve GDPR Compliance in the Cloud – Across AWS, Microsoft Azure and Google Cloud

The world’s top three cloud services providers, Amazon Web Services, Microsoft Azure and Google Cloud (GCP) have all announced compliance with GDPR. But imagine a world where you can view all your geo-located online instances and protected assets across multiple public cloud platforms – all within a single user-friendly portal.

more →

Blog

Stand-alone Web Application Firewalls are not enough!

This month we are publishing a blog from cloud security partner, Zenedge. Here, we explore the evolution of the security threat landscape, from threat actors improving their hacking techniques to the increasingly daunting task of protecting public-facing web applications and API endpoints. Not only do organizations need to get to grips with reality and understand they are under attack nearly 100 percent of the time, they must also come to terms with the fact that their current approach to defending their applications and APIs is woefully deficient.

more →

Blog

2018 Contact Centre Predictions: It’s All About the Customer

This month we share a blog from our Technology Partner Enghouse Systems on their 2018 Contact Centre Predictions.

How are Contact Centres going to evolve over the year? Will there be more focus on automation and self-service solutions? A change in the way we handle customer interactions?

Contact Centre Predictions 2018

The role of the contact centre agent will continue to evolve

We expect to see ongoing investment by businesses in self-service and automation solutions during 2018.

more →

Blog

2018 Cybersecurity Predictions – Big Bad Attacks on Automation

What will happen in cyberspace in 2018? How will technology impact the real world over the next year? To kick off 2018, we are sharing a cybersecurity predictions blog from technology partner Radware.

2016 was the Year of DDoS. 2017 was the Year of Ransom. Can we assess leading indicators of new attack techniques and motivations to predict what 2018 will bring?

more →