Alcatel-Lucent Adds Versa SD-WAN, SASE to Network Portfolio

Giant software vendor Alcatel-Lucent Enterprise is bolstering its networking and edge security capabilities by offering technologies from Versa Networks in its portfolio. The European-based company recently announced that Versa’s... Read more »

Data Loss Prevention (DLP) Best Practices & Strategies

Exchanging data across networks and within enterprises requires security measures to protect the data from being lost or stolen. How do you ensure that your company’s sensitive data isn’t... Read more »

Best Data Recovery Software for Restoring Data 2021

You’ve accidentally deleted a file. Your system crashed and you lost data as a result. A virus infiltrated your systems and deleted or otherwise altered important company documents. Many... Read more »

Contact Center as a Service (CCaaS) vs. Communications Platform as a Service (CPaaS)

In recent years , the use of cloud-based solutions have become increasingly popular across all industries. Businesses need reliable, flexible, and cost-effective ways to communicate with their customers, and... Read more »

Cyber action plan kicks off to ‘supercharge’ UK security sector

UK government says its cyber growth action plan will provide a large boost to Britain’s security industry as it sets out to create a roadmap for future growth Read more »

Scattered Spider widens web to target insurance sector

Following a series of high-profile attacks on prominent retailers and consumer brands, the Scattered Spider cyber crime collective appears to be expanding its targeting to the insurance sector Read more »

What is confidential computing?

Confidential computing is a concept in which encrypted data can be processed in memory to limit access to protect data in use. It is especially suitable for public clouds. Read more »

What is market concentration?

Market concentration refers to how a market is distributed among competing companies. Read more »

What is HMAC (Hash-Based Message Authentication Code)?

Hash-based message authentication code (HMAC) is a message encryption method that uses a cryptographic key with a hash function. Read more »

What is a compliance audit? (With an example checklist)

A compliance audit is critical for finding any potential compliance gaps in an organization’s operations. Here’s what companies can do to prepare for them. Read more »

Fortifying retail: how UK brands can defend against cyber breaches

The recent spate of cyber attacks on UK retailers has to be a wake-up call to build more cyber resilience into digital supply chains and fortify against social engineering... Read more »

MPs to investigate potential for government digital identity scheme

Amid growing calls for a national digital ID scheme, Home Affairs Committee launches inquiry into likely benefits and risks Read more »

NHS IT the big winner in Reeves’ Spending Review

The chancellor of the exchequer has significantly upped spending on digital and technology initiatives in the current Spending Review period, with the NHS receiving a 50% tech funding increase. Read more »

WhatsApp seeks to join Apple in legal challenge against Home Office encryption orders

WhatsApp today applied to intervene in an Investigatory Powers Tribunal case that is considering the UK’s ability to issue a technical capability notice on Apple to ‘weaken encryption’ Read more »
Subscribe to our Newsletter