Tag "Network Security"

Back to homepage
Network Security

DevOps and SecOps: how to close the gap between them?

The International Organisation for Standardisation has published an Open Systems Interconnection reference model for the most basic elements of computer networking which is also known as the ‘7-layer’ model that

Hardware/Network

Think Data Security, Not Endpoint Security

A strong data protection strategy is essential to protect information as it moves across endpoints and in the cloud. INTEROP 2019 – LAS VEGAS – Endpoint security is a common

Software

On the path to Zero Trust security: Time to get started

No need to belabour the point. We all know that trying to defend the network perimeter is a bit futile in today’s mobile and cloud first world. So, the obvious question –

Network Security

Healthcare industry failing on Cybersecurity

Healthcare institutions are still rocking that 10-year-old Windows 7 or Windows Server 2008, putting themselves at serious risk of cybersecurity breaches, data theft, ransomware and all other kinds of nasties.

Artificial Intelligence Software

On the path to Zero Trust security: Time to get started

No need to belabour the point. We all know that trying to defend the network perimeter is a bit futile in today’s mobile and cloud first world. So, the obvious question –

Hardware/Network

Threat Hunting: The Proactive Angle to Cyber Security

Threat hunting is a proactive approach that is being utilized in cyber security to detect anomalies and threats before they materialize into an attack. Attackers are ahead of the game:

Expert Articles

CYBER SECURITY

By Afrozulla Khan Z – Cyber Investigator at  SRL TRINITNY VISION PVT LTD, Cyber security is the protection of internet-connected systems, including hardware, software and data, from cyber attacks.  In

Hardware/Network

Security spring cleaning: 5 tips for tidying up network safeguards

Networks need regular cleaning just like your home, car or garage. Why? The answer is simple – poor security hygiene can lead to major data breaches. If you don’t regularly review your

Hardware/Network

The IoT threat landscape is expanding rapidly, yet few companies are addressing third party risk factors

There is a dramatic increase in IoT-related data breaches specifically due to an unsecured IoT device or application since 2017 – from 15 percent to 26 percent – and the

Hardware/Network Mobile

Mobile carriers believe security and reliability concerns will increase with 5G

Mobile service providers anticipate significant new revenue opportunities from the coming deployment of high-speed 5G networks and a host of new IoT-driven use cases, but they also believe much-improved security will be