What's going on

Stay up-to-date with the latest industry news, blog posts, and insights.

Placeholder for Runner street shimmerRunner street shimmer
Forcepoint

Data breach response plan: best practices in 2019

Data breach response plan best practices, enabling companies to retain business, customers, and shift brand perception in the market.

1 min. read
Placeholder for Green snakeGreen snake

Email security

Decoding Email Security

Email Security expert blog by Kunal Biswas: Email is one of the most popular communication mediums for organisations today. It  is also the most prominent attack vector. Emails are being accessed using multiple devices, from different locations, shaping a 'converged device landscape' for email use.

1 min. read
Placeholder for Bismuth gemstoneBismuth gemstone

Cybersecurity

Cybersecurity in 2020: A new dawn

What lies ahead in the near future for cyber security? What can we expect? In this blog I'll attempt to answer what cyber security might look like in 2020.

1 min. read
Placeholder for Shark fish schoolShark fish school

The dark side of governments: A growing threat of APT groups

For most nation states, covert advanced persistent threat (APT) groups are an equally valuable tool that operate in the shadows, stealing data, disrupting operations, or destroying the infrastructure of targeted enemies.

1 min. read
Placeholder for Milkyway lakesMilkyway lakes

Network security

Top 5 Network Security Solutions and Technologies

The 5 best Network security solutions and technologies that help define and guarantee business success. Unfortunately many enterprises do not know what network security solutions are essential to securing their network and data.

1 min. read
Placeholder for Partial view of woman using laptopPartial view of woman using laptop

Endpoint security EDR

5 Endpoint Security Best Practices

Your Cyber Security strategy should include Endpoint Security, as it is one of the most critical components for network security. In this article, our experts sum up Endpoint Security best practices for the Enteprise.

1 min. read
Placeholder for Fortinet firewallFortinet firewall
Fortinet

Fortinet Wins SE Labs Best Network Security Appliance Award

Fortinet has been awarded the Best Network Security Appliance award from SE Labs – one of the most respected labs in the testing community. SE Labs has been testing FortiGate products for the past three years, and in addition to this accolade, have awarded a AAA rating to the FortiGate solution for the third year in a row.

1 min. read
Placeholder for City reflectionsCity reflections
McAfee

McAfee acquires container security startup NanoSec

McAfee, announced the acquisition of NanoSec, a multi-cloud, zero-trust application and security platform. The acquisition will enable organizations to improve governance and compliance and to reduce risk of their cloud and container deployments.

1 min. read
Placeholder for Runner street shimmerRunner street shimmer
CrowdStrike

CrowdStrike Endpoint security

CrowdStrike Positioned as a Magic Quadrant “Leader” for Endpoint Protection Platforms 2019

Crowdstrike is positioned as a “Leader” in the 2019 Gartner Magic Quadrant for Endpoint Protection Platforms (EPP). This recognition from Gartner is the first time Crowdstrike has been placed in the Leaders Quadrant with their Crowdstrike Falcon Endpoint Protection Platform.

1 min. read
Placeholder for Wide angle sky line blueWide angle sky line blue

3 things we can learn from the Monzo PIN code breach

Earlier this week popular new UK challenger bank Monzo announced via its blog that they had been incorrectly storing approximately 20% of their users PIN numbers due to the way the system was designed when you performed a couple of different actions within their app.

1 min. read
Placeholder for Glass reflectionsGlass reflections
Forcepoint

Cloud app security in a direct-to-cloud world

There are a few more things to think about when considering direct-to-cloud connectivity: How it impacts cloud application usage and organizational security.

3 min. read
Placeholder for Shark fish schoolShark fish school

Network security Enterprise networking

Top 5 Key Challenges for Network Security

We have compiled a list of key challenges regarding network security and cyberthreats, as numerous companies and governments are taking measures to ensure privacy and maintain security by preventing cyberattacks. Nevertheless, cybersecurity remains a constant and ongoing issue of considerable concern.

1 min. read
Placeholder for FlyoverFlyover
Arbor Networks

DDoS Attacks Growing Ever-More Sophisticated and Efficient

DDoS attacks in 2019 remain some of the most prevalent. Research of Forbes reports that there were 2,216 data breaches and more than 53,000 cyber security incidents in March 2018.

1 min. read
Placeholder for DatacenterDatacenter

Juniper Networks named Leader in Gartner's Magic Quadrant 2019 for Data Center Networking

Infradata Partners Juniper Networks, Cisco and Arista Networks are named a Leader in Gartner’s Magic Quadrant 2019 for Data Center Networking

1 min. read
Placeholder for Telecommunications towerTelecommunications tower

Diameter routing

A brief look into the future of the Diameter Routing Agent

Nomios has a next generation Diamet Routing Agent (DRA) in it’s portfolio that delivers many advanced features. A pure software-based solution that can run on COTS hardware or on any available virtualization platform as VMware, KVM, Xen, and more.

1 min. read
Placeholder for WarsawWarsaw

Infradata completes acquisition of IT security provider DIM System

Infradata, a leading European provider in cyber security and cloud networking, announced today that it has completed its acquisition of DIM System, a prominent cyber security company in the Polish market. The acquisition also includes subsidiaries Tukan IT (file and email classification software provider) and SOC24 (state-of-the-art Security Operations Center services provider).

1 min. read
Placeholder for Elevator shaftElevator shaft

Mobile network modernisation, the journey to 5G

5G is the next generation of cellular mobile network. It’s a smart ecosystem that will provide a universal solution, low latency and the agility required for service providers to launch customized business services that will generate greater value.

1 min. read
Placeholder for Ceiling light structureCeiling light structure
Juniper Networks

Mist announces Mist Edge, AI-driven support and new Access Points

Announced by Mist: AP43 series Access Points, Mist Edge and AI-driven support for evolving AI-driven wireless enterprise networking

1 min. read

Sign up for our newsletter

Get the latest security news, insights and market trends delivered to your inbox.