Opinion
Opinion
Security Network Services
-
How can security vendors react to the growing AI threat?
Some of the great and the good of the cyber security vendor world share their predictions about what technologies will dominate this year Continue Reading
-
Nurturing authentic partnerships in the security vendor landscape
Phil Sansom, Director Business Development and Alliances at Barracuda MSP , shares some thoughts about the need to break the speed dating cycle in the security industry Continue Reading
-
Four ways to protect your OT environment from cybersecurity incidents
Nick Ewing, managing director, EfficiencyIT, shares some advice on securing OT environments Continue Reading
-
The important role of SIEM in the SOC Triad
Sean Tickle, cyber services director at Littlefish, details why a SIEM is such an important element for the channel to understand Continue Reading
-
What is Managed SOC and why should you care?
Rowan Troy, senior security consultant at Littlefish shares his thoughts about the benefits of using a SOC Continue Reading
-
Threat hunting for MSPs
Iratxe Vazquez, senior product marketing manager at WatchGuard, provides top tips for managed service providers to help their customers stay one step ahead of the cyber criminals Continue Reading
-
Circle of distrust: the security challenge for managed service providers
The life of a managed service provider is tough, and the rise in security challenges could be set to make it tougher, with MSPs having to work hard to gain partner trust Continue Reading
-
Maximising manpower for business customers
With IT teams struggling with a lack of manpower and skills to cope with the increase security demands on networks, MSPs can provide a welcome relief. In the second of a three-part series, we look at the growing need for managed security service ... Continue Reading
-
The catch-22 of cyber security
The cyber security industry is booming, which is good news for the channel – but that means the cyber threat is increasing too Continue Reading
-
IT security is broken: Six ways partners can help fix it
Many organisations have numerous non-integrated security point products installed across their enterprise, the management of which is a huge challenge. Here, we discuss how partners can help their customers to adopt a more holistic approach to ... Continue Reading
-
IoT security: A winning strategy for MSSPs
Don’t let your clients’ IoT initiatives make them vulnerable to cyber attacks Continue Reading
-
Digital transformation: How far are we really in the journey?
Are customers really in as much of a hurry to digitally transform as the shrillest advocates of the technology would like us to believe? Continue Reading
-
Will IAM make you more secure in a less secure world?
There are growing opportunities for the channel with identity and access management, as migration to hybrid environments gains pace Continue Reading
-
The five challenges SMEs face due to poor internet connectivity
What are the leading problems for small to medium-sized enterprises when it comes to internet connectivity? Continue Reading
-
What can IT providers learn from the Tortoiseshell Group attack
Following recent news around the Tortoiseshell Group attack targeting IT providers in Saudi Arabia, Alex Bransome discusses what IT providers can learn from the attack and advises on ways to reduce the risk of supply chain attacks Continue Reading
-
Supporting intelligent workspaces
As new technology continues to drive new ways of working, IT departments need support in facilitating the flexibility and connectivity demanded by today’s tech-savvy workforce Continue Reading
-
What makes a great managed security service provider?
With an increasingly challenging threat landscape, being a successful MSSP can be a struggle. Making sure customers stay safe is critical to the success of your business, which is why understanding what makes a great MSSP is crucial for you to be ... Continue Reading
-
Friction between management and employees exacerbates insider threat
Research revealing disparity between workers’ and bosses’ views on data security could shed more light on insider threat Continue Reading
-
How to block DDoS attacks using automation
Automation can significantly improve response times during a distributed denial of service attack, reducing the potential damage to targeted organisations Continue Reading
-
Securing SD-WAN – beyond the base level
Software-defined networks has sophisticated security features built in, but additional layers of security are required to ensure robust protection against increasingly advanced cyber threats Continue Reading
-
Apstra stops the cyber criminals from loitering with intent
Intent-based networking fine-tunes all the complicated variables that influence the performance of a network infrastructure and can head off any potential cock-ups Continue Reading
-
Security chiefs: don’t ignore the 5G future, it’s coming fast
The benefits of 5G are numerous, but so are its challenges. Greg Day, vice-president and CSO, EMEA, at Palo Alto Networks, discusses what security executives need to know Continue Reading
-
A private matter for Zuckerberg
Has Facebook boss seen the light on user privacy? Continue Reading
-
Continuum says there’s money in cyber crime, but SignIn pulls us back from the brink
Cyber crime looks like child’s play in TV dramas – and could the visitor’s book at datacentres be a weak link in security? Continue Reading
-
Why software patch management matters
When building a business case for software patch management, focus on its ability to protect against malware, ransomware, phishing and other security threats, thereby reducing the risk of downtime Continue Reading
-
Why insider threat is like a travel-sick dog
Asking employees to follow best security practices is rather like having a travel-sick dog – you can hope for best behaviour, but sometimes all you can do is clean up the mess Continue Reading
-
How resellers can cash in by making their clients Siccura
Security should be the most exciting sector in IT, yet the marketing is dull and unimaginative. We need stories of cops and robbers, not another set of meaningless statistics Continue Reading
-
The security challenges of OT and how the IT department can help
Operational technology comes with its own unique challenges and benefits, but the IT department can shine a light on how to tackle its security issues Continue Reading
-
Botnets and machine learning: A story of hide and seek
As security practitioners develop new ways to keep cyber threats at bay, so malware authors continue to update their software and evolve their techniques to take advantage of new technologies and bypass security measures. Machine learning has proved... Continue Reading