Zero Trust now the fastest-growing network security segment By John Herrema published 3 March 23 Security Decision Makers can Deploy ZTNA With Confidence
Legacy VPN will be replaced by ZTNA, sooner rather than later By TechRadar Pro published 14 December 22 Interview: Perimeter81 tells us more about the future of VPN and the year ahead.
Why a converged network security solution is the perfect fit for remote work By Richard Sutherland published 11 December 22 Converged network security solutions meet modern operational challenges while keeping your business-critical applications secure.
Nearly all businesses are adopting Zero Trust, but still aren't getting its full business potential By Sead Fadilpašić published 7 December 22 Zero Trust security protocols have a lot to offer, but most businesses don't feel the urgency to switch.
Many SMBs still just aren't equipped to deal with cyberattacks By Sead Fadilpašić published 7 December 22 A lack of qualified staff and budget are also named as issues.
10 of the best ZTNA online courses By Richard Sutherland published 4 November 22 Our list of the top 10 best online ZTNA courses for IT professionals.
10 of the best resources online to master ZTNA By Richard Sutherland published 3 November 22 Learn everything you need to know about ZTNA from these 10 free online resources.
5 critical steps to implementing ZTNA within a business By Richard Sutherland published 2 November 22 The five steps to putting zero trust network access (ZTNA) to work in your organization, securing your vital business assets.
Want to become a ZTNA professional? Here are 10 tips to get you started By Richard Sutherland published 1 November 22 10 things IT professionals need to know about ZTNA to get started in the niche.
What is ZTNA 2.0 and how does it differ from ZTNA 1.0? By Richard Sutherland published 31 October 22 We look at the new Zero Trust Network Access (ZTNA) 2.0 initiative to see what it adds to remote security best practices.
What is the future of ransomware attacks and how could security companies respond? By Rob Clymo last updated 4 October 22 Ransomware attacks are evolving all the time so organizations will have to do the same to protect themselves properly
10 mindblowing facts and statistics about ransomware attacks By Rob Clymo last updated 4 October 22 Ten facts and figures that will make you think again about beefing up your software security arsenal
What are the different types of ransomware? By Rob Clymo last updated 4 October 22 Knowing the variants of malicious software out there could help save you from the clutches of cybercriminals
5 things to look for in your next ransomware protection solution By Rob Clymo last updated 3 October 22 Ransomware might be rife but taking the right preventative measures can help reduce the risk of being attacked
Ransomware in 2023: here's what businesses should expect By Rob Clymo last updated 3 October 22 Every business should have security software measures in place to fend off increasing threats from cybercriminals
The 10 worst ransomware attacks ever By Daniel Blechynden last updated 9 September 22 We list the top 10 ransomware attacks in history, explaining what went wrong and how damaging they can be.
You're a ransomware victim: Here's 5 things you should do By Michael Graw last updated 9 September 22 If you’re the victim of a ransomware attack, these are five steps you can take to minimize the damage and save your data.
5 steps to prevent a ransomware attack By Michael Graw last updated 9 September 22 We explain five important steps companies can take to protect their networks from ransomware attacks.
5 common myths about ransomware By Michael Graw last updated 1 September 22 Falling for these five myths about ransomware can leave your organization more vulnerable to cyberattack.
What is ransomware and how does it work? By Michael Graw last updated 5 September 22 We explain what ransomware attacks are and how they work, so businesses and individuals can defend their data.