Three-quarters rely on traditional VPNs for remote access while a third also use zero trust as part of their remote access strategy.
Read MoreHPE will provide connectivity, security, and network design for the West Midlands event, delivering an enhanced, first-of-its-kind onsite experience and digital legacy for the region.
Read MoreIt’s hard to imagine a time when Internet connectivity was such an important commodity in our everyday lives. In the pre-pandemic world we relied on it, but the act of national lockdowns, global travel restrictions and quarantine orders pushed us to lean ever more heavily on that connectivity. By Ashley Stephenson, CTO, for Corero Network Security.
Read MoreWhy businesses need a bigger boat for tackling IaC security By Robert Haynes, SCA & Open Source Evangelist, Checkmarx.
Read MoreWhere should cloud-centric organisations focus data protection? By Anurag Kahol, CTO, Bitglass.
Read MoreThe most crucial part of any cloud native journey is learning about cloud native security early on in the process. By Rani Osnat, VP Strategy at Aqua Security.
Read More