
Implementing zero trust: Time to think beyond identity
Digital transformation and multi-cloud adoption by enterprises are forcing organizations to re-think the traditional network perimeter

Why application delivery should look more like a factory (and less like an artisan’s shop)
In the long-ago pre-cloud era, application delivery looked very different than it does today. That’s because nothing moved faster than the speed at which IT could procure and provision the servers on which the applications ran. Planning for new applications or major application updates took many months or years.

NGFW
Cybercrime soars in the first month of 2020
Would or should you pay a ransom? 2020 has begun and already multiple companies have fallen victim to ransomware and featured in the headlines as a result. Infradata discusses cybercrime as-a-service as a growing business model.

A10 Networks Extends Carrier-class Firewall Product line with Container Solution and New 5G Network Ready Features
The Thunder CFW includes functionality that helps ensure the security, reliability and availability of 5G networks as they transition from physical network functions to be completely cloud native.

Telenet selects Infradata and BroadForward to deliver Location Based Services
The Location Based Services (LBS) solution delivered by Infradata at Telenet, provides access to location information of devices across legacy and next generation mobile networks.

Fortinet Acquires SOAR provider CyberSponse
"With the integration of CyberSponse’s powerful SOAR platform into the Fortinet Security Fabric, we will offer customers accelerated incident response and the ability to standardize and scale processes"

Cloud security
7 guiding principles to selecting the right cloud security solution
Here are 7 essential principles to guide you to evaluate and select the best cloud security solution for your multi-cloud environments, spanning AWS, Azure, and Google Cloud Platform.

Ransomware: The Digital Plague that Still Persists
Ransomware began its reign of cyber terror in 1989 and remains a serious and dangerous threat today. In layman’s terms, ransomware is malware that employs encryption to lock users out of their devices or block access to critical data or files.

Why 5G Security and Interoperability must not be optional extras
Mobile Solutions Architect Ditri Trio elaborates on 5G Security and Interoperability challenges with existing 3G and 4G networks.

McAfee Introduces CASB-Integrated Cloud Security Platform for Container-Based Applications
McAfee MVISION Cloud for Containers provides: Cloud Security Posture Management (CSPM), “Shift Left” DevOps Integration, Vulnerability Scanning of container images.

Routing Juniper Networks
Juniper incorporates Security Intelligence to MX Series Routers
Juniper Networks incorporates Juniper Networks’ security intelligence onto the MX Series routers. Security can be extended to routing infrastructure to turn connectivity layers into automated defense layers at scale.

Cloud security
19 cloud security best practices for 2019
Mitigate risks to using any cloud service with these Cloud Security Best Practices. Cloud computing has become near-ubiquitous, with roughly 95 percent of businesses reporting that they have a cloud strategy.

McAfee named Leader in Forrester WAVE Cloud Workload Security report
McAfee has been named a leader by indepentent research firm Forrester in its first WAVE report on Cloud Workload Security (CWS).
DMARC email authentication - how UK law firms are protecting clients, data and insurance premiums
DMARC (domain-based messaging, authentication, reporting and conformance) is a globally-recognised industry standard that authenticates an email sender ensuring that a hacker cannot impersonate the law firm’s domain, and thus commit email fraud. DMARC is one of the minimum cyber security standards required by the British Government of all departments and their contractors.

Juniper Networks
Juniper Networks Expands Enterprise Portfolio with Cloud-Managed SD-LAN and CPE Devices
NFX350, SRX380 and other new enhancements bring cloud agility and scale to more parts of the enterprise network, while lowering the cost of deploying and operating SD-Branch environments.

Cybersecurity
Budgeting for cybersecurity: Are you doing it right?
For CISOs and cybersecurity teams in your organisation, every action and investment should be made with the goal of mitigating risk.

CrowdStrike
Crowdstrike gets highest rating in Gartner's Customer’s Choice for Endpoint Protection Platforms
As on of the best endpoint protection platforms in 2019, Crowdstrike now received the Gartner Customer’s Choice with the highest overall rating (4.9 out of 5) among endpoint security vendors.

Cloud security
Defining cloud security – Is it the endpoint, your data, or the environment?
“Secure the cloud.” What does that phrase mean? On the surface, it’s easy to assume this phrase means using cloud-enabled security products. However, it’s much more than that. Cloud security is about securing the cloud itself through a combination of procedures, policies, and technologies that work together to protect the cloud.
Sign up for our newsletter
Get the latest security news, insights and market trends delivered to your inbox.

