The EU’s Privacy Regulations Loom

The EU’s Privacy Regulations Loom

Recently BAE Systems released research stating that over half of UK businesses have suffered a…

read more
SDP: Certes Is An Innovation Leader In Software-Defined Perimeter

SDP: Certes is an innovation leader in Software-Defined Perimeter

Certes Networks has been named a key innovator in the fast-growing Software-Defined Perimeter (SDP) Market.…

read more

Tesco Bank Hack – the Fatal Flaw

As Tesco Bank in the UK works around the clock to address the fraudulent activity…

read more
Securing Cloud Applications In The Age Of IT Sprawl

Securing Cloud Applications in the Age of IT Sprawl

The Dropbox breach didn't occur because cybercriminals managed to hack their systems. Instead, hackers stole…

read more

Why identity access management is a key part of IoT security

A part of security IoT systems involves enforcing role-based, "No Trust" identity access controls that dictate which devices and employees can interact with specific applications. 
read more
Report Shows 4 Biggest Threats To Local Government Information Security

Report shows 4 biggest threats to local government information security

Perimeter-focused policies and poor data access management are at the heart of 30 local government…

read more
EU Data Protection Reform: Protecting Personal Data

EU Data Protection Reform: Protecting personal data

The EU Data Protection reform requires companies in control of personal data to take the necessary steps to ensure it is confidential, showing that putting the correct means of security in place is vital.
read more
How Can Role-based Access Control Protect Retail Payment Systems?

How can role-based access control protect retail payment systems?

To run responsive, efficient operations, retailers integrate their payment solutions with their back-end inventory systems,…

read more