

Before Covid-19, cyber security teams already confessed to being overworked – battling simply to keep their heads above a constant tide of security alerts, across numerous tools and reports. High profile security breaches, with malware at their root, were a seemingly weekly occurrence. The financial and reputational...
Published: Jan 22, 2021


Securing the perimeter is no longer enough. The focus has shifted to ensuring your organization continues to function if and when you’re breached — and that’s what micro-segmentation is all about.
This book will help you become secure beyond breach.
Based on real-world scenarios and written...
Published: Jan 18, 2021


Illumio was named a Leader in Forrester’s latest Wave report evaluating the top Zero Trust platform providers. Out of 15 vendors, Illumio received the highest scores in the three primary categories.
Zero Trust priorities have evolved in 2020 to require solutions that secure your remote workforce with an...
Published: Jan 18, 2021


Today’s most potent cyber threat isn’t a zero-day vulnerability, new malware or the latest exploit kit. It’s your own users. That’s because today’s attacks target people, not IT infrastructure. No matter what form they take, most cyber attacks need a human victim to help activate them. They...
Published: Nov 24, 2020


The attacks can and do hit organizations of all sizes and are only becoming more widespread and difficult to detect. The consumerization of IT and Bring Your Own Device (BYOD) only exacerbates the issue since companies now have many more endpoints to protect—many of which they don’t own.
In a survey of...
Published: Jul 18, 2013


Speak the languages that power the web.
With more high-paying web development jobs opening every day, people with coding and web/app building skills are having no problems finding employment. If you’re a would-be developer looking to gain the know-how to build the interfaces, databases, and other features that...
Published: Apr 20, 2020


Each day, over 100 billion corporate email messages are exchanged. With email at the heart of businesses, security is a top priority. Email-based threats are more organized, targeted, and dangerous than ever before and the costs of security breaches nullify any short-term savings gained from settling for basic protection....
Published: Jun 16, 2014


Mimecast delivers a software-as-a-service (SaaS)-based enterprise email management solution that complements the client’s existing on-premises email infrastructure.
It provides services including antispam, antimalware, archiving, eDiscovery, continuity, and policy management. For a more detailed overview of...
Published: May 15, 2014


Much of our daily lives intertwine with artificial intelligence. From watching movies recommended by our entertainment streaming service, to interacting with customer service chatbots, to autotagging photos of friends in our social media apps, AI plays an invisible part in enriching our lives. While AI may be seen as a...
Published: Jan 08, 2020


A business’ ability to create value stems from its ability to make wise decisions based on sound knowledge of the opportunities and risks of any given scenario. Yet synthesising useful knowledge that enables value-creation decisions is a capability that eludes many businesses. What all businesses do have is data...
Published: Nov 03, 2020


Ransomware isn’t new. In fact, it’s 30-years-old . What IS new is ransomware’s sudden rise as a favored attack by cyber criminals . Cyber crime has become a lucrative business and, unfortunately, ransomware has become an integral attack method that many organizations are fighting a losing battle against. ...
Published: Aug 02, 2019


Email is organisations’ most essential business tool—and today’s top malware delivery vector. It has become fertile ground for the most damaging cyber threats and all kinds of fraud, the channel where cyber attackers are most likely to compromise their targets.
They trick users into clicking on an...
Published: Jun 05, 2020


This white paper explores the problems of email management. Discover how you can implement an email management policy that navigates the challenges of regulatory and compliance laws by reading on now.
Published: Oct 01, 2012


Today, companies are digitising as quickly as possible to help deliver the experiences customers expect. Crucial to this process is adopting electronic signatures to transact business digitally and get approvals, as paper-based processes and wet-ink signatures are inefficient, expensive and time-consuming.
In this...
Published: Sep 18, 2019