EZINE:
In this issue, find out how the security channel has been working to ensure the network safety of remote workers during the pandemic. Also read about how flash-based storage is being enhanced to include ground-breaking technology using helium and DNA, and discover how data is the key to encryption
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series explains how graph theory can be used to model internetworks and improve their resilience against failures and attacks.
INFOGRAPHIC:
Recent studies show that the lack of cybersecurity awareness is still the biggest detriment to an organization's cyber defences. Insufficient training and persistent misinformation are factors that can compromise a cybersecurity operation. In this infographic, we put together some of the top myths around cybersecurity and how you can address them.
EGUIDE:
In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
EGUIDE:
In this e-guide, we explore how network security, while remaining relevant, needs to change in its approach to meet the needs of new technologies and threats. We also look at why it should now be seen as one of several key elements of a modern cyber security strategy.
INFOGRAPHIC:
IT security teams face an ongoing challenge: how best to collect data and turn it into intelligence to stop cyber threats. To help out, vendors have released generations of products that aggregate and analyse security events. In this infographic, learn the differences between SIEM, SOAR and XDR, and how these tools can help improve cyber security.
EGUIDE:
From using machine learning to restore public confidence to startups that are making a dent in the DevOps space, ANZ organisations have been punching above their weight on the global technology stage. In this roundup, we recap the top 10 ANZ IT stories, including the opportunities and challenges that organisations in the region have faced in 2021.
EGUIDE:
Many organizations believe that if certain technologies and tools are put in place, processes are reviewed and risk assessments are conducted, they’re compliant. But the reality of compliance goes deeper than simple implementation and review. Read this expert guide to understand the role played by IAM in establishing and maintaining compliance.
EBOOK:
Zero-trust security means more than trusting nothing and no one. It's the best way devised yet to fill the void that the disappearance of the enterprise perimeter left. Learn what steps security pros need to take to implement an effective, zero-trust approach to IT security.
EGUIDE:
In this e-guide: After announcing their plans to extend and improve basic 4G connectivity around the country, the UK's mobile operators are celebrating their principal gains in the 5G arena with low-band and mid-band spectrum.