Understanding today. Shaping tomorrow.
Get to know our authors
There was a lot of talk about cyber security in Barcelona. You can find out what developments we can expect here.
Cybersecurity in decentralized environments: know exactly what is happening in the IT systems and the network with SIEM.
Does security suffer if firms adopt agile trends like hybrid working?
How companies can meet their compliance requirements with intelligent security solutions – and strengthen their resilience.
Discover common pitfalls to avoid when implementing a Zero Trust security strategy and ten essential steps.
Find out why the Zero Trust approach is more relevant in today’s world of digital transformation and hybrid work.
What is microsegmentation, and how does it protect your enterprise from malicious activity and cyber threats?
What is NIS2, what companies does it apply to, how will it influence cybersecurity, and how should you approach it?
Why must businesses focus on cybersecurity and compliance together, and how compliance can turn into an advantage.
Holding the keys to secure enterprises in the near future with External Key Management (EKM) – our blog post explains how it works.
External Key Management (EKM) can play a valuable role in your AWS security. Learn more about the purpose of external key management.
Gain transparency of your security vulnerabilities with an AWS Security Assessment. Learn how it works in our blog.