Protect
Protect is one of TechFinitive.com’s five key pillars. Here, we provide in-depth analysis of emerging threats to businesses along with a wealth of articles that will never go out of date – because the sad truth is that attackers will always be after our data.
We have a particular focus on ransomware, from simple guides to the key terms to the real-world after effects of a phishing attack. But we also want to provide practical advice on how to protect your business, whether that’s putting defensive measures in place or reminding people of the basics of cyber hygiene.
One of our key advantages is the depth and breadth of our writers’ experience. Davey Winder is one of the UK’s most respected cybersecurity journalists, having won numerous awards (it helps that he was once a hacker himself) and been covering cybersecurity ever since it became a “thing” in the 1990s.
We also draw on the knowledge that KG Orphinades earns in their day job, advising local small businesses on how to stay secure (KG also runs a website dedicated to VPNs). Last, and most definitely not least, Simon Edwards is CEO and founder of SE Labs, one of the world’s leading security testing labs, and a board member of the Anti-Malware Testing Standards Organization (AMTSO).
If you have a story that you would like to share – and we are happy to keep company names anonymous – then email us at [email protected], follow us on Twitter or join our community on LinkedIn.
Uniting Diverse Brands Under A Single Identity Management Solution
Read this case study on why DCC chose Okta to maximise the potential of its merger and acquisition campaigns.
Okta for Mergers and Acquisitions White Paper
Read the Okta for M&A whitepaper now to explore the key challenges businesses face during mergers and acquisitions.
Increasing Agility for Mergers and Acquisitions
Read the Increasing Agility for Mergers and Acquisitions solution brief by Okta to explore the common barriers that slow down M&A success.
Cybersecurity: The 2022 Board Perspective (Year in Review)
Proofpoint and Cybersecurity at MIT Sloane surveyed 600 board directors around the world. Download the report to read their findings.
Securing Microsoft 365
This e-book explores modern threats, best practices for protecting users and data, and what capabilities to look for when enhancing your Microsoft 365 defences
Redefining Data Loss Prevention (DLP)
Why insider threat management should be a critical part of your data loss prevention program.
2023 State of The Phish in Asia-Pacific
Download 2023 State of the Phish: Asia-Pacific and Japan to learn the biggest regional cyber threats and how to make your users your best defense.
Protecting the End User
This gated guide reveals how companies can best assess and mitigate user risk and how they can use that information to implement a successful and people-centric cybersecurity strategy.
Cisco Encrypted Traffic Analytics
The rapid rise in encrypted traffic is changing the threat landscape. As more businesses become digital, a significant number of services and applications are using…
Guards vs Firewalls: Ensuring Secure Data Transfer
Learn when software guard technology may be a better solution than available firewall technologies. Government and commercial entities are constantly on alert to prevent and…
The Future of the Firewall
Achieving a stronger posture today while building a bridge to meet tomorrow’s business and security demands The purpose of this white paper is to discuss…
Securing traditional and cloud-based data centers with next-generation firewalls
As organizations evolve from traditional data centers to virtualized and cloud computing environments, security architectures must support the changing set of requirements. This includes not…
Modern Data Protection: Definitive Guide to Veeam
Data is everywhere, across different applications, in multiple locations across your expanding ecosystem including on premises, public cloud and hybrid all at the same time.…
Cyber Threat Predictions for 2023
An Annual Perspective by FortiGuard Labs While “less is more” is the critical strategy behind consolidating networks and security, “more is more” seems to be…
CIO Essential Guidance
The CISO security threat landscape. The cybersecurity professionals who contributed to the fourth edition of our Global Security Insights Report are in a very different…
Best Practices for Selecting a Vulnerability Management (VM) Solution
With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right…
How to solve 7 critical security problems with ETM
As the use of SSL/TLS encrypted communications grows, so does risk due to hidden threats. To minimise risk, businesses deploy next-gen firewalls, intrusion prevention systems,…
Malware Review: A Look Back and a Look Forward
Like any threat, malware evolves. To stay in front of ransomware, credentials theft, and more, download the Cofense Malware Review. Get insights from Cofense Intelligence…
7 Best Practices for Data Security in Office 365 and Beyond
Data Security in a Complex, Hybrid World We are in the midst of a global shift from purely on-premises information technology infrastructure to hybrid environments.…
Zero Trust Network Access for dummies
Brought to you by Palo Alto Networks Zero Trust Network Access For Dummies, Palo Alto Networks Special Edition, consists of five chapters that explore the…