Mobile security Safe not sorry: Why SMBs must improve mobile security

Tom Davison, EMEA Technical Director at Lookout discusses the issues surrounding cyber threats of SMBs and some potential resolutions using …

Information Security How to use a zero-trust model to strengthen security

John Stock, product manager, Outpost24, discusses how organisations can improve security by implementing zero-trust models.  In the recently released Verizon …

Information Security It’s time to kill the VPN

Kurt Glazemakers, CTO Secure Access at Cyxtera, says that legacy technologies, such as VPNs, have worked as a stop gap, …

Podcast What’s the big deal about zero trust?

Our theme this week is “zero trust” – what is it and how can you implement it in your organisation. …

Information Security Post-perimeter security: dawn of a borderless world

What impact does going mobile have on enterprises today? Tom Davison, EMEA Director at Lookout, discusses the new post-perimeter security …

Information Security Minimising the threat of a cyber-attack from all possible angles

Andy Heather, Managing Director – EMEA for Centrify, says that the old adage, “trust but verify” doesn’t cut it in …

Passwords Why security at work goes far beyond passwords

With more companies suffering serious data breaches in the past few months, and more people than ever before having their …

Human factor The problem of trust

Doveryai, no proveryai. “Trust but verify,” as Ronald Regan said. And, as much as I admire the Gipper for his …