News
Our latest Blogs/News
21 Mar Why machine identities matter (and how to use them)
"The migration of everything to the cloud and corresponding rise of cyberattacks, ransomware, identity theft and digital fraud make clear that secure access to computer...
18 Mar Operational resilience is much more than cyber security
"Very few organisations need persuading that operational resilience is increasingly necessary – but achieving true resilience involves more than cyber security." - read more at...
18 Mar You’re in the cloud: but how much of your license fees are you wasting?
"With the rush to put workloads in the cloud and enable remote working many businesses signed up to costly cloud licenses to make it happen...
17 Mar Email authentication helps governments and private companies battle ransomware
"The first line of defense against ransomware lies with email authentication. Learn more information about how to take a proactive approach to cyber attacks." -...
17 Mar Healthcare cybersecurity trends: Organizations not quite ready to deal with threats
"Protected Harbor announced the launch of its latest whitepaper on healthcare cybersecurity which offers readers an insight into evolving healthcare data breach patterns, predictive threats...
16 Mar Boost your home network with DNS caching on the edge
"If you've been hearing a lot of talk about "the cloud" over the past several years, then you may also have heard rumblings about something...