Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Publications

Framework for a Comprehensive Ransomware Recovery Plan

Let's face it, recent ransomware attacks have caught many IT professionals off guard. Reason being is they honestly didn't have adequate plans in place. And it's not totally their fault. The ransomware attacks of today are far more sophisticated. Which means you need an equally sophisticated, yet easy to implement plan in place to survive and recover. In this whitepaper, Framework for a Comprehensive Ransomware Recovery Plan, we give you the tools to develop your own ransomware recovery playbook.

Protecting Unstructured Data

Most of the collective data fueling today's technological and scientific advances consists of unstructured data files - trillions of them. Large files, medium files, and small files are stored on NAS systems, Unix servers, Windows servers, and public cloud platforms. And the number of individual files behind these innovations continue to increase at an exponential rate. Download this ebook and learn how to enhance visibility, protection, and mobility at petabyte scale for your unstructured data.

Evaluating encryption with the NIST Protect framework

A variety of cyber security frameworks exist to help organisations in different sectors to go about IT security in a rigorous and controlled manner. To name a few, there's ISO IEC 27001/ISO 27002, the US NIST Cyber security Framework and the UK NIS Regulations Cyber Assessment Framework. The frameworks are an excellent way to help formalise the process of implementing and maintaining effective cyber security strategies through defined structures containing processes, practices, and technologies which companies can use to secure network and computer systems from security threats.

Using Transparent Encryption to Defeat 12 Common Data Breaches

Securing the network perimeter has long since been recognised as insufficient. With today's environment of local networks, networked devices and cloud applications, organisations use security techniques such as Zero Trust, the Software Defined Perimeter and Microsegmentation to cope. These approaches and related technologies are designed to block unauthorised access to data containers, i.e. files. Control over access to files is the new security perimeter.

The Perfect Scorecard: Getting an A in Cybersecurity from your Board of Directors

Corporate board members are known for their relentless focus on the bottom line -- and with good reason. CISOs and other security executives are often mired in technical language and many times, unable to communicate the business impact that cybersecurity has on the bottom line. This helps explain why the average tenure of a CISO is roughly two years.

Deploying Zero-Trust Networks in the Era of COVID-19: A Guide for Service Providers

The coronavirus pandemic has exposed business continuity inadequacies at many organizations, and highlighted the slow pace of progress in digital transformation. This new reality necessitates a departure from a traditional network-centric security model that assumes every device and user within the network should be trusted.