Networking

SDN, NFV, and a host of other cutting-edge technologies are hitting your network faster than you can say Ethernet Fabric. But which are truly critical?

  • State of the Internet / Security : Credential Stuffing in the Media Industry

    White Papers · Jul 2020 · Provided By Akamai

    Between January 1, 2018, and December 31, 2019, Akamai recorded more than 88 billion credential stuffing attacks across all industries. When we look specifically at the media sector, which includes streaming media, television networks, cable networks, broadcasting, and even digital publishing and advertising, that number is about 17 billion, or...

    Find Out More
  • Why IT Leaders Should Consider a Zero Trust Network Access Strategy

    White Papers · Jul 2020 · Provided By Zscaler APAC

    IT leaders should start by first understanding their company’s risk portfolio and determine how risk averse their business is. Their crown jewel apps may be SOC-1 or ISO 27001 compliant and require additional layers of security. These are considered critical infrastructure. There may be certain countries, like China, that must...

    Continue
  • Top Challenges Migrating Apps to Office 365

    White Papers · Jul 2020 · Provided By Zscaler APAC

    If you’re like most IT and network leaders in the midst of an Office 365 migration, you’ve probably encountered a variety of changes and situations that you were totally prepared for and some, perhaps, that you weren’t. Whether you’re just beginning your migration or you’re well on your way, Office...

    Find Out More
  • Compliance Practices in a Digital-First World On-Demand Webinar

    Webcasts · Jun 2020 · Provided By Splunk

    Businesses have come to realise all data is security relevant and defending against threats involves every department in a company. The need for a pragmatic way to manage risk and meet compliance standards calls for Splunk's best-in-breed Compliance Analytics App designed to support: Any format, any source, any time...

    Watch Now
  • VPN usage policy

    Downloads · Jun 2020 · Provided By TechRepublic Premium

    As more and more users work from remote locations, the need for secure access to networks, systems, and data continues to grow. This policy provides guidelines to help IT ensure that VPNs are properly deployed and outlines acceptable use policies for end users on company-issued and personal devices. From...

    Download Now
  • The Definitive Email Security Strategy Guide

    White Papers · Jun 2020 · Provided By Proofpoint

    Email is organizations’ most essential business tool and cyber attackers trick users into clicking on an unsafe link, giving away their credentials, or even unwittingly carrying out attacks themselves (such as wiring money or sending sensitive files). The threats have changed. Yet much of the cybersecurity sector remains stuck in...

    Find Out More
  • You’ve Got Business Email Compromise!

    White Papers · Jun 2020 · Provided By Proofpoint

    Requests from the appropriate person, requests for wire transfers or sensitive employee information may be part of a normal workday. BEC scammers take advantage of human psychology and business processes to trick your users. It’s no wonder BEC scams have stolen billions of dollars from victims already—and the pace is...

    Find Out More
  • 2020 Cost of Insider Threats Global Report

    White Papers · Jun 2020 · Provided By Proofpoint

    Ponemon Institute is pleased to present the findings of the 2020 Cost of Insider Threats Global Report study. We interviewed 964 IT and IT security practitioners in 204 organizations in North America (the United States and Canada), Europe, Middle East & Africa, and Asia‑Pacific. Our targeted organizations were business...

    Find Out More
  • Scaling IoT for water networks

    White Papers · Jun 2020 · Provided By Telstra

    Digitisation is transforming all sectors of the Australian economy. To guarantee a more secure and sustainable water future, the water sector is embracing digital solutions to develop new capabilities. This will help benefit a substantial amount of areas, particularly customer experience, operational efficiency, environmental sustainability and regulatory compliance. Learn...

    Download Now
  • Mobile Security Summary

    White Papers · Jun 2020 · Provided By Telstra

    As our lives become more connected, cyber security has emerged as a top-of-mind issue for business leaders and governments right across the world. With cybercrime increasing, organisations of all kinds are regularly experiencing breaches that interrupt operations, compromise customer privacy and in the very worst cases irretrievably damage reputations or...

    Download Now