Government Cloud On-Ramping

The UK Treasury is becoming increasingly frustrated by the billions of pounds wasted by government departments on legacy technology and proprietary infrastructure. With Digital Transformation now imperative, there is little patience for the endemic delays in decision making that are adding untenable costs to a government that simply has no more resources. Why are departments […]

High Assurance Delivers SD-WANs For All

30-Day Cybersecurity Sprint

The prohibitive cost of WAN technology has become a major concern for businesses and governments and driven the explosion in adoption of Software-Defined Wide Area Networks (SD-WAN) in recent years. Yet a gap is beginning to emerge between those businesses able to explore the flexibility and low cost offered by SD-WAN and those, typically regulated, […]

Harvest Now, Decrypt Later

It is now inevitable that the encryption algorithms used to secure vital data across the world – from defence and banking to infrastructure and air travel – will be breached. With the escalation in computing power enabled by quantum technology, the question is not if, but when potentially devastating breaches will occur. With ‘harvest now, […]

Zero Trust Architecture – No Longer A ‘Nice To Have’

The US National Institute of Standards and Technology’s (NIST) recent Special Publication (SP 800-207) has changed the table stakes when it comes to cybersecurity best practice. While not mandatory, the federal agency’s role in enhancing economic security cannot be under-estimated. As such, its guidance on refining the concept of Zero Trust and its high-level roadmap […]

Cyber Security: Data ‘Re’-Assurance

How do organisations know their data is secure? And how can companies ensure that a network breach won’t result in a loss of sensitive data? The consequences of a data breach are potentially disastrous for any organisation, so companies need to be reassured that their data is secure at all times in line with any […]

Three Reasons The Security Industry Is Protecting The Wrong Thing

Why is it that the security industry talks about network security, but data breaches? It’s clear that something needs to change, and according to Paul German, CEO, Certes Networks, the change is simple. For too long now, organisations have been focusing on protecting their network, when in fact they should have been protecting their data. […]

Entering The New Age Of The CISO

The role of a CISO is undoubtedly changing. Not only does the role now require more responsibility than ever, but the heightened risks associated with the role has put it firmly in the spotlight of both the company Board and the industry as a whole. And, when it comes to a data breach, the simple […]

The Cybersecurity Checkup: Is The Healthcare Industry Doing Enough?

It is no surprise that hackers will always target high value, critical data, so amongst some of the most targeted industries is healthcare; the highly sensitive patient data stored in this industry creates a playground ready for waiting hackers to exploit. In the past five years alone, healthcare breaches have grown in both frequency and […]

The Session Border Controller As A Virtual Network Function

Simplicity is becoming a major selling point – especially when it comes to IT security. As organisations wake up to the huge additional requirements associated with the new General Data Protection Regulation (GDPR) that comes into force in 2018, any solution that can minimise complexity is compelling. The use of Software Defined Networking to deliver […]

The Time Is Now For Software-Defined VoIP Security

According to Michael Dell, Chairman and CEO, Dell Technologies, software-defined data centres will become “pretty much de facto standard” in the next 5 to 10 years, speaking at the Dell EMC World 2017 in May. On face value, this might not seem like a revolutionary prediction. After all, the IT infrastructure landscape has undergone a fundamental […]