previous arrow
next arrow
Slider

Blog

By  Jan Van Vliet

2019 has seen a string of high profile, public cyberattacks. And as many organisations have found, data breach can be costly. For example, in July Capital One’s insider attack cost an estimated $300 million+. Also in July the ICO proposed a record fine costing upwards of £183 million to British

By  Lior Cohen

Organizations that store data, use applications and run workflows across multiple public cloud platforms create a serious challenge for security architects. Establishing and maintaining a consistent security posture for an organization that relies on an assortment of cloud platforms and services—especially when they all take different approaches to security and

By SM Picks

Samsung mobile devices need to be protected against the many cyber security threats that exist today. These Android-based smartphones and tablets can be compromised in several ways, whether through malicious action on the part of hackers or unintentional consequences due to user error. This guide provides a comprehensive list of

By  Lance Whitney

5G is being touted by many as the latest and greatest wireless technology with faster speeds and lower latency than its predecessors and the ability to juggle multiple devices, including Internet of Things (IoT) hardware and other demanding items. But concerns have arisen in some circles, including the European Union,

By Jon Oltsik

According to ESG research, 36% of organizations are actively integrating disparate security analytics and operations tools in pursuit of a more cohesive security technology architecture (note: I am an ESG employee).  Another 48% of organizations say they are somewhat active with security analytics and operations tool integration. This data describes

Locations

Get a Quote

If you have questions or comments, please use this form to reach us, and you will receive a response within one business day. Your can also call us directly at any of our global offices.