top of page


SASE architecture - a blueprint for MSSPs
Managing IT security, connecting branches and remote users - all this requires too much work. A new architecture is required.
Jul 25, 2023


Access controls and data-at-rest encryption go hand in hand
Sensitive data exfiltration by way of internal or external malicious users requires rethinking access control and data-at-rest encryption.
Jul 21, 2023


Protecting public web services with WAF - things to watch
Publishing web apps expands the attack surface and complicates management. The not so typical list of things to watch when looking for a WAF
Jul 20, 2023


Are the attacks on Red Hat valid?
The attacks are not justified: Red Hat is a victim of its own success but also a late comer to the cloud IaaS market.
Jul 17, 2023


Microsoft re-entering network security and slowly but surely ditching Active Directory brand
After more than a decade, Microsoft appears to be reentering the competitive network security market, currently dominated by established...
Jul 15, 2023


Most Fortigate devices still open to attack in the Adriatics
A quick search within the Adriatics region reveals almost 60% are unpatched, allowing malware deployment. What are the lessons?
Jul 11, 2023


MOVEit breach fallout still resonates
More than a month since the MOVEit software breach, the fallout is still ongoing: last week PBI Research (a data management provider)...
Jun 28, 2023


Fortinet updates its NSE certification program
Quickly progress to your chosen certification level within the new Fortinet NSE program.
Jun 23, 2023


Try FIDO2 MFA authentication
Password fishing (phishing) is the most successful attack technique, with insecure password logins being responsible for over 80% of data...
Jun 22, 2023
bottom of page
