Cybersecurity and threat news for Europe, the Middle East & Africa
These search results are from across the Techday network of sites
Quantum computing in the telecom sector and more cybersecurity trends
According to a new report, quantum computing will be a destabiliser for the telecom sector, making PKI obsolete in the near future.
How flexible identity systems support mobile working – Ping Identity
Increased time outside of the official workplace has become the reality of working life for employees in a rapidly digitising economy.
Ping Identity releases capabilities framework for zero trust deployments
The Ping Identity model provides numerous starting points for architecting Zero Trust security.
A10 Networks adds zero-day automated protection (ZAP) to DDoS Defence
Today’s DDoS attacks are more prevalent, multi-vector in nature and morph over time.
Companies struggling with hybrid IT and zero trust controls – Pulse Secure
61% of IT organisations have little to modest confidence to mitigate access security threats, despite a majority significantly increasing their near-term budget.
Forget endpoints—it’s time to secure people instead
Security used to be much simpler: employees would log in to their PC at the beginning of the working day and log off at the end. That PC wasn’t going anywhere, as it was way too heavy to lug around.
Trust without visibility is blind – Avi Networks
Enterprises are wanting to gain the trust of their customers, but are often found blindly defending themselves.
Four steps to Zero Trust network security - AlgoSec
The core principles of zero trust reflect the reality of today’s complex, heterogenous enterprise network environments.
Ping Identity CTO’s cybersecurity predictions for 2019
“Our borderless world provides unprecedented freedom and convenience, but also breeds a whole new set of cybersecurity risks and concerns.”
Stronger security needed before open banking arrives - Okta
As early as July 2019, Australian banks will need to have a system in place that both benefits customers and protects their personal data.
Why total visibility is the key to zero trust
Over time, the basic zero trust model has evolved and matured into what Forrester calls the Zero Trust eXtended (ZTX) Ecosystem.
Why endpoint security is critical in a post-perimeter era
Traditional perimeter-based security strategies – once the backbone of enterprise security – simply no longer apply.