In the last ten years or so, securing our local area networks has become more difficult, thanks to ubiquitous high-speed broadband and a proliferation of internet-enabled devices. Some of these are branded ‘smart’ but their widespread adoption could be considered less so. Some, like smartphones, add convenience but most introduce security risks. Whether it’s at […]

Security awareness is often linked to anti-terrorism programs around the world but in the IT world we are referring to cybersecurity awareness. Many of you are already switching off, yawning and considering leaving this page but hang on a moment… The subject may well have been harped on by management, consultants and IT teams and […]

As finance companies deploy Internet of Things (IoT) solutions, they must ensure that connections and critical data are secure. As finance companies continue to update security technologies, and make use of all types of IoT) solutions, there are more opportunities for network security breaches. These technologies are used for all types of things—from everything like […]

Network security practices are familiar to most organizations as the policies and practices that protect your computer from cyber attacks. Information Technology (IT) professionals and executives generally agree they’re necessary, but some of these practices are becoming outdated as organizations transform digitally. Basically—it’s time to rethink the old school way. Traditionally, you have public and […]

You’d be hard pressed to find any business leader that said they didn’t want to be agile. The ability to pivot quickly, make fast decisions and change course in the midst of a project is valuable today as the business landscape becomes more volatile. The thing is, we’re also bombarded with news of security breaches, [...]

Automation has been cited as the next big thing for IT leaders looking to secure their communications in all types of cloud environments—but leadership knows the challenges they face in doing so. Answering to a Network World survey, 47% of respondents claim that it is difficult to monitor network behavior from end-to-end, and 41% say […]