Security
Security | News, how-tos, features, reviews, and videos
Endpoint Detection and Response (EDR): Which solution is best?
Peerspot users review the highest reviewed solutions in the endpoint detection and response (EDR) market.
The CISO of tomorrow
It’s one of the most stressful jobs in security thanks to an ever-expanding array of technologies, compliance requirements and threats but the responsibilities of the CISO could be about to change. Jamal Elmellas, COO at...
What are the world’s worst passwords?
World Password Day highlights why passwords still play a vital role in securing our digital environments, even if they do need augmenting with newer, stronger authentication methods.
Cyber prevention or mitigation… Why can’t it be both?
The technology market today is being flooded with security solutions from across the globe that claim to be unique and practically unbeatable. But when it comes to defence, do you prioritise attack prevention or damage mitigation?
Security orchestration, automation and response (SOAR): Which solution is best?
Peerspot users review the highest reviewed solutions in the security orchestration, automation and response (SOAR) market.
Is business acumen now more vital for a CISO than security knowledge?
The days when security was only important to financial services and defence organisations are long gone, and with hefty fines and reputational damage having a devastating impact on businesses – board members are starting to take note...
Data privacy in 2022 – are you still compliant?
Legal compliance and digital trust are the two main issues pushing investment into privacy in 2022, as organisations wrangle with a growing number of privacy regulations and customer demand for improved transparency.
Secure access service edge (SASE): Which solution is best?
Peerspot users review the highest reviewed solutions in the secure access service edge (SASE) market.
Sovereign cloud: Protecting data in a complex regulatory environment
As the data economy flourishes, organisations must keep up with laws and regulations impacting data sovereignty and ensure they stay in compliance. Neil Stobart, VP of Global System Engineering for Cloudian looks at the five main data...
Enterprise infrastructure VPN: Which solution is best?
Peerspot users review the highest reviewed solutions in the enterprise infrastructure VPN market.
Why the data marketplace model could help businesses in Africa
A decentralised data sharing platform can transform businesses, especially those in credit and payments.
Industry needs to plug IoT security holes or face vertical meltdown
PSA Certified’s 2022 Security Report reveals significant gaps in IoT security provision, with only 31% of technology decision-makers feeling ‘very satisfied’ with their level of security expertise in-house. So, what are these gaps in...
CPRA: A look at the state of California’s data privacy law
A look at California’s new and more robust data privacy legislation - California Privacy Rights Act (CPRA).
Netcompany CEO invests in talent and shared customer risk
Chief executive and founder of Netcompany, André Rogaczewski, says it's time to share the digital transformation risk.
Security and tech pros are finding ways to help people in Ukraine
The global tech industry is doing lots to help Ukraine, from evacuating employees to hackathons aiding the country's "IT Army" volunteers.
Will state-level privacy laws drive the case for a US federal regulation?
California has been the standard bearer for US state privacy laws in recent years. But as more US states pass their own GDPR-like laws, what do these state-level laws mean in practice, what do companies have to contend with state to...
Patch management - what should your priorities be?
We have had patching in place for years, so why is it not getting easier? Tom Bridge, Principal Product Manager, JumpCloud discusses why patching is still such an issue for IT teams - and how to get it right.
SSL VPN: Which solution is best?
Peerspot users review the highest reviewed solutions in the SSL VPN market.