What is Zero Trust Security? And why should you care?
Outdated assumptions that anything within the security perimeter can be trusted has made organisations more exposed to cyber-attacks. This has...
Outdated assumptions that anything within the security perimeter can be trusted has made organisations more exposed to cyber-attacks. This has...
We’ve all been steadily moving to cloud-based systems for some time now, but with the sudden increase in remote working due to the pandemic, the pace...
Security as a Service (SECaaS) is a cloud delivery model for outsourcing cybersecurity. It provides security services like malware protection,...
At the beginning of the COVID-19 pandemic, when prolonged periods of remote working became a reality, employers had concerns. Could they maintain...
The SolarWinds Orion hack could become one of the most extreme and severe cyber-attacks in history. A series of...
Amid the COVID-19 crisis, many businesses have made it a requirement for their employees to work from home. This means thousands of employees are...
Is Cloud IT working for you or are you working for IT? Since launching our Touch Cloud private compute service in 2016, it’s attracted commercial,...
Next-generation firewall (NGFW) vs. traditional firewall: How they differ