What does good look like? Part one

Part one Preamble  We always hear the words in security “good practice”, “good security” and so on. But what does good mean? From the GDPR it uses the lovely phase of “Taking into account the nature, scope, context and purposes of processing as well as the risks of varying likelihood and […]

Read more
Bring Your Own Device

5 Best Practices for BYOD

The practice of BYOD can be described as the practice in which the organizations allow their employees to utilize smartphones, computers or any other smart device for work purposes. In recent times, there are several organizations that have been implementing the BYOD policies in order to create a successful BYOD […]

Read more
Data Breach

Cybersecurity vs. AWS

In this technologically evolving world, Cybersecurity and cloud computing have become extremely essential. In the current business world, every organization is now opting for the AWS services following the requirement of managing the huge amount of the data that is produced every year. In terms of utility, cybersecurity is important […]

Read more

Selling to the CISO

Or Matt’s guide to Selling to the CISO ( I only put this in for SEO sorry) Being a former Global CISO and security leader in the telecommunications, manufacturing and healthcare industries my goal was to build a security and risk management program that identified the most critical risks to […]

Read more
CATO SASE

Secure Remote Access

Key points of implementing secure remote access In today’s era, the Industrial Internet of Things has completely changed the way of working of the OEM business model. The overall equipment effectiveness business model is extremely efficient and beneficial for the organizations. Several IoT establishments require monitoring of their machines closely […]

Read more
Cyber cloud threats

Cybersecurity solutions in the digital age

The need for Cybersecurity solutions in the age of digital transformation  It is fair to say that we are living in a hyper-digital world. We are surrounded by gadgets that are all interlinked with each other and we are finding ourselves getting more and more reliant on these devices with […]

Read more