The world of technology is an ever changing one with cybersecurity being the epitome of that. Cybersecurity is an area in which the inability to adapt to change has visible and almost immediate negative consequences. It is because of this that even though it is hard...
Network Security
The value of managed security services in your organisation
IT has become mission critical, and increasingly acts as business’s trusted advisor in an increasingly digital marketplace. Companies have been digitalising rapidly, especially over the past 18 months as new working models have begun to emerge. The IT environment is...
Understanding the cybersecurity mesh and its impact on your enterprise
In a rapidly evolving digital world, one can be forgiven for feeling overwhelmed with the width and breadth of threats, innovations, and technologies an organisation has to be aware of to stay ahead of the curve. Compounded with the shift in landscape brought on by a...
To VPN or Not to VPN?
Over the past few years, VPN vulnerabilities have been in the spotlight and talked about everywhere. There is always some vulnerability being abused by opportunists and criminals, but VPNs still remain the majority solution of choice for remote access across the...
Multi-Vendor Firewall Change Tracker for Network Security Admins
As the spread of COVID-19 is forcing employees to work remotely, it’s put an unprecedented strain on organizations’ network and security teams, a direct result of the sudden rise in new access requests from remote employees. For many IT departments, this means having...
Zero Trust Architecture: Best Practices for Safer Networks
A zero trust architecture enables organizations to prioritize access and restrictions. The goal is to implement a zero trust policy across all traffic, to ensure no user, device, or system can put the network at risk. Zero trust architectures typically enforce three...
Monitoring 802.1X EAP: What You Need to Know
First Thing’s First As we’ve written about previously, the standard authentication protocol used on encrypted networks is Extensible Authentication Protocol (EAP), which provides a secure method to send identifying information for network authentication. 802.1x is the...
How AI detected a hacker hiding in an energy grid within hours of deployment
A cyber-criminal had already made the first steps of a critical intrusion at a European energy organization when the company deployed AI for cyber defense. Despite the attacker already lurking in the system, Darktrace was able to recognize that their activity deviated...