Alcatel-Lucent Adds Versa SD-WAN, SASE to Network Portfolio

Giant software vendor Alcatel-Lucent Enterprise is bolstering its networking and edge security capabilities by offering technologies from Versa Networks in its portfolio. The European-based company recently announced that Versa’s... Read more »

Data Loss Prevention (DLP) Best Practices & Strategies

Exchanging data across networks and within enterprises requires security measures to protect the data from being lost or stolen. How do you ensure that your company’s sensitive data isn’t... Read more »

Best Data Recovery Software for Restoring Data 2021

You’ve accidentally deleted a file. Your system crashed and you lost data as a result. A virus infiltrated your systems and deleted or otherwise altered important company documents. Many... Read more »

Contact Center as a Service (CCaaS) vs. Communications Platform as a Service (CPaaS)

In recent years , the use of cloud-based solutions have become increasingly popular across all industries. Businesses need reliable, flexible, and cost-effective ways to communicate with their customers, and... Read more »

Home Office ‘backdoor’ seeks worldwide access to Apple iCloud users’ data, court documents confirm

A court filing states that a government order against Apple would give it the capability to access communications and metadata of customers using the iCloud service anywhere in the... Read more »

Home Office ‘back door’ seeks world-wide access to Apple iCloud users’ data, court documents confirm

A court filing sates a government order against Apple would give it the capability to access communications and ‘metadata’ of customers using Apple’s iCloud service anywhere in the world... Read more »

How to manage Active Directory security

Understanding prevention and recovery steps is crucial for managing attacks on Active Directory Read more »

AI and backup: How backup products leverage AI

We look at how AI helps with backup, from AI analysis of backup jobs and their integrity through natural language support functionality to ransomware and anomaly detection Read more »

UK cyber security centre helps expose China-based cyber campaign

GCHQ cyber security centre and its international partners release details of malicious cyber activity linked to Chinese businesses Read more »

What is network security? Definition and best practices

Network security encompasses all the steps taken to protect the integrity of a computer network and the data within it. Read more »

Incident response planning cuts the risk of claiming on cyber security insurance

Proper attention to incident response planning is emerging as a core cyber control when it comes to reducing the risk of having to claim on cyber security insurance, according... Read more »

Ransomware activity levelled off in July, says NCC

Ransomware levels held steady in the month of July, although the risk remained as persistent as ever Read more »

Three new Citrix NetScaler zero-days under active exploitation

Citrix patches three new vulnerabilities in its NetScaler lines warning of active zero-day exploitation by an undisclosed threat actor. Read more »

Okta makes AI identity play with Axiom acquisition

Okta says Axiom Security’s technology will reinforce its own offerings in privileged access management, especially when it comes to the growing number of non-human identities Read more »
Subscribe to our Newsletter