Best practices when implementing SD-WAN

Telecoms is an overall complex business – delivering network circuits and optimizing connections – but SD-WAN has its own very specific set of obstacles. SD-WAN involves many components that contribute to overall internet network performance such as na… Continue reading Best practices when implementing SD-WAN

Too fast, too insecure: Securing Mongo Express web administrative interfaces

Mongo Express is a lightweight web-based administrative interface deployed to manage MongoDB databases interactively. It is authored using Node.js, Express and Bootstrap packages. This case study highlights the deployment of Mongo Express admin panels … Continue reading Too fast, too insecure: Securing Mongo Express web administrative interfaces

Another European manufacturer crippled by ransomware

Aebi Schmidt, a Switzerland-based manufacturer and provider of municipal and agriculture machinery, has apparently been hit by ransomware. What happened? “Due to an IT system failure, the Aebi Schmidt Group can temporarily neither receive nor sen… Continue reading Another European manufacturer crippled by ransomware

You can’t fix what you can’t see: A new way of looking at network performance

Network performance, or the service quality of a business’ network, is critical to running a successful enterprise. Imagine the cost to an organization when the corporate network or the e-commerce site is down or experiencing unacceptable latency. Cust… Continue reading You can’t fix what you can’t see: A new way of looking at network performance

Nearly half of firms suffer data breaches at hands of vendors

As trusted partners, third-party vendors often become the overlooked or unwitting accomplice in criminal activities. As privacy laws and cybersecurity regulations continue to increase accountability around data confidentiality and protection, eSentire … Continue reading Nearly half of firms suffer data breaches at hands of vendors

What you can expect at HITBSecConf2019 Amsterdam

Taking place across 5 days from the 6th till the 10th of May 2019, HITBSecConf2019 Amsterdam is one of the most prestigious cybersecurity events in Europe. With the event celebrating a decade of excellence, we took this opportunity to sit down with Dhi… Continue reading What you can expect at HITBSecConf2019 Amsterdam

The foundation: Quantifying risk with focused security measurement

When you hear “quantify risk,” you might think it’s the buzz-term du jour. You might be right. Risk quantification is a hot topic right now. It seems everyone who touches security – from the C-suite to the board – has this at the forefront of the… Continue reading The foundation: Quantifying risk with focused security measurement

DevSecOps: Fast development without sacrificing safety

DevOps has been a boon to companies looking to shorten the systems development cycle, pushing software developers and IT operations to work together and help their enterprises fulfil their business objectives. But while DevOps has been embraced relativ… Continue reading DevSecOps: Fast development without sacrificing safety

Building a modern data registry: Go beyond data classification

For organizations, understanding what data they store and analyze is gaining increasing urgency due to new privacy regulations, from the Global Data Privacy Regulation (GDPR) to the California Consumer Privacy Act (CCPA) and Brazil’s General Data Prote… Continue reading Building a modern data registry: Go beyond data classification

Microsoft 365 security: Protecting users from an ever-evolving threat landscape

In this age of frequent security and data breaches, the statement “We take our customers’ privacy and security very seriously” has been heard from breached companies so often as to become a point of mockery, anger and frustration. But… Continue reading Microsoft 365 security: Protecting users from an ever-evolving threat landscape