Protect
Protect is one of TechFinitive.com’s five key pillars. Here, we provide in-depth analysis of emerging threats to businesses along with a wealth of articles that will never go out of date – because the sad truth is that attackers will always be after our data.
We have a particular focus on ransomware, from simple guides to the key terms to the real-world after effects of a phishing attack. But we also want to provide practical advice on how to protect your business, whether that’s putting defensive measures in place or reminding people of the basics of cyber hygiene.
One of our key advantages is the depth and breadth of our writers’ experience. Davey Winder is one of the UK’s most respected cybersecurity journalists, having won numerous awards (it helps that he was once a hacker himself) and been covering cybersecurity ever since it became a “thing” in the 1990s.
We also draw on the knowledge that KG Orphinades earns in their day job, advising local small businesses on how to stay secure (KG also runs a website dedicated to VPNs). Last, and most definitely not least, Simon Edwards is CEO and founder of SE Labs, one of the world’s leading security testing labs, and a board member of the Anti-Malware Testing Standards Organization (AMTSO).
If you have a story that you would like to share – and we are happy to keep company names anonymous – then email us at [email protected], follow us on Twitter or join our community on LinkedIn.
Cisco Encrypted Traffic Analytics
The rapid rise in encrypted traffic is changing the threat landscape. As more businesses become digital, a significant number of services and applications are using…
Guards vs Firewalls: Ensuring Secure Data Transfer
Learn when software guard technology may be a better solution than available firewall technologies. Government and commercial entities are constantly on alert to prevent and…
The Future of the Firewall
Achieving a stronger posture today while building a bridge to meet tomorrow’s business and security demands The purpose of this white paper is to discuss…
Securing traditional and cloud-based data centers with next-generation firewalls
As organizations evolve from traditional data centers to virtualized and cloud computing environments, security architectures must support the changing set of requirements. This includes not…
Modern Data Protection: Definitive Guide to Veeam
Data is everywhere, across different applications, in multiple locations across your expanding ecosystem including on premises, public cloud and hybrid all at the same time.…
Cyber Threat Predictions for 2023
An Annual Perspective by FortiGuard Labs While “less is more” is the critical strategy behind consolidating networks and security, “more is more” seems to be…
CIO Essential Guidance
The CISO security threat landscape. The cybersecurity professionals who contributed to the fourth edition of our Global Security Insights Report are in a very different…
Best Practices for Selecting a Vulnerability Management (VM) Solution
With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right…
Italy warns of global ransomware attack
Italian officials report that servers using VMware ESXi were attacked by cyber criminals, exposing a worldwide flaw.
How to solve 7 critical security problems with ETM
As the use of SSL/TLS encrypted communications grows, so does risk due to hidden threats. To minimise risk, businesses deploy next-gen firewalls, intrusion prevention systems,…
Malware Review: A Look Back and a Look Forward
Like any threat, malware evolves. To stay in front of ransomware, credentials theft, and more, download the Cofense Malware Review. Get insights from Cofense Intelligence…
7 Best Practices for Data Security in Office 365 and Beyond
Data Security in a Complex, Hybrid World We are in the midst of a global shift from purely on-premises information technology infrastructure to hybrid environments.…
Zero Trust Network Access for dummies
Brought to you by Palo Alto Networks Zero Trust Network Access For Dummies, Palo Alto Networks Special Edition, consists of five chapters that explore the…
6 Myths of SIEM
SIEM has changed greatly in recent years, which begs the question, what truly makes a modern SIEM today? This white paper dispels 6 common myths…
What are zero-day exploits?
Zero-day exploits are the bane of both IT managers and end users. So how can you best protect yourself and your business?
What is IAM (Identity & Access Management)?
IAM stands for identity & access management, and it's increasingly important as we move into a more collaborative, hybrid world.
How do you spot a fake WeTransfer email?
Received an email from WeTransfer? Not sure if it's a con? Read our guide to spotting a fake WeTransfer email
How do I fix “Server SSL certificate verification failed: issuer is not trusted” when using SVN?
Seeing an error relating to "server SSL certificate verification failed"? Find out how to fix this for your WordPress installation
How do I withhold my mobile number?
Want to hide your mobile number in the UK? Click here to find out how to easily withhold your mobile number on Android and iPhone
How good is Windows Defender?
Is Windows Defender good enough to be your only antivirus software for Windows 10 and Windows 11? Find out here