How does security visibility help your cybersecurity posture?

16th August 2016

Cybersecurity is a constant battle to stay ahead. The Cybersecurity Capability Maturity Model (C2M2) outlines a process to move your security posture to the next […]


The 7 Cyber Security Skills That Are Highly Valued And Sought After By Large Enterprise

9th August 2016

Large enterprise organisations are under immense pressure to address cyber security skills shortages, leaving their critical assets and data open to attack.


Top 10 Questions for Security Visibility Solutions:

1st August 2016

Packet visibility – Are you asking the right questions? If your organization needs traffic aggregation or packet optimization to bolster visibility to security solutions, there […]


Weather Forecasting and Risk Management: From Failure to Success

1st June 2016

Weather forecasting and risk management share a few commonalities: both weather forecasting and risk management use numbers to describe what may happen in the future. […]


How secure is your network?

In this post we look at the gap between network security best practices and the “rubber-hits-the-road” reality across a sample of the UK FTSE 100 […]


2016: The Year of Smarter Cyber Security and ‘Immune System’ Technology

The increasing interconnected nature of business brings with it the risk of cyber attack, with individuals intent on stealing, selling or changing information. Motives are […]


Malware Museum showcases vintage viruses

Malware may have racked up costs to the tune of billions in the past, but computer viruses in the 1980s and 1990s were also pieces […]


The Akana guide to API security

7th January 2016

As more enterprises engage in their digital transformation, they are connecting their application through APIs. APIs have long been the connective tissue between, and among, […]


Reduce risk when taking telephone payments

Taking or making payment over the phone comes with inherent risk of fraud in a variety of ways. The number one problem, however, is people. […]


‘Hack them back’ US gov told

‘Anything you can do, I can do better’, or so says the song. And this may soon become the US policy on hacking. A report […]