Video Byte: Cloud Security and Software Defined Perimeter
In our latest video byte, we’re discussing Cloud Security with Don Boxley, Co-Founder of DH2i – and found an amazing analogy for cloud securit in the process.
Read more...In our latest video byte, we’re discussing Cloud Security with Don Boxley, Co-Founder of DH2i – and found an amazing analogy for cloud securit in the process.
Read more...Since the introduction of cloud computing it has been touted as a “more secure” option than local servers. As the number of data breaches in the cloud grow, however, that may no longer be the case. Just as in all cases of security failures, human error is at the core.
Read more...What is Zero Trust? Although Zero Trust offers a host of benefits for enterprises, many companies struggle to figure out where and how to start. We spoke with Nathan Howe from Zscaler, to run down the basics of Zero Trust.
Read more...Today is World Password Day. Read what the industry has to say here at Cyber Protection Magazine. With qutoes from Nexsan, Retrospect, DH2i, Tanium, Thales and Thycotic.
Read more...Under the influence of cloud and AI adoption, camera security is quickly becoming a business priority. Cloud video surveillance can provide insights into organisations and help increase profits – if done right. Here are three things you need to know about Cloud Video Surveilance.
Read more...APIs are rapidly evolving into the new application layer. As they do, it becomes increasingly important to secure those APIs properly. Read our expert article by Omer Primor from Imvision for details.
Read more...Our special for world backup day is here – with commentaries from 5 experts, an article on the importance of data protection and the golden 3-2-1 rule – read on!
Read more...Traditional perimeter security are no longer a good fit for todays changing threats. Learn about SASE, a new way of approaching cybersecurity.
Read more...