Number of Reported Breaches Decrease In First Half of 2020
Cloud Security
Technology, security threats and competition – they all change rapidly and constantly. Your security stack must therefore be ahead of every emerging threat, but just as importantly, enable full-speed business processes by reducing friction in critical workflows.
-
New Vulnerabilities in Open Source Packages Down 20% Compared to Last Year New Vulnerabilities in Open Source Packages Down 20% Compared to Last Year
29th June, 2020 -
SMBleed: A New Critical Vulnerability Affects Windows SMB Protocol SMBleed: A New Critical Vulnerability Affects Windows SMB Protocol
12th June, 2020 -
Smart Teaching to Avoid Data Breaching It can’t have escaped everyone's attention, since the move to the cloud the number of data breaches has gone through the roof. In this article, GlobalDots' Solutions Architect Steven Puddephatt discusses why this is happening, why workplace policy won’t fix it, and what your organization can do to reduce the risk of being next.
5th June, 2020 -
VMware to Acquire Kubernetes Security Firm Octarine VMware to Acquire Kubernetes Security Firm Octarine
18th May, 2020 -
What is Identity and Access Management and Why It’s Important for Modern Companies Business expansion usually leads to an increase in users and employees accessing various applications and platforms from many devices. With an IAM framework in place, companies can control user access to critical information within their organizations.
23rd April, 2020 -
Neglected Infrastructure, Invasive Tech to Plague Infosec in 2022 Neglected Infrastructure, Invasive Tech to Plague Infosec in 2022
20th April, 2020 -
The Future for Network Security: What Does SASE Bring to the Table? In this article, GlobalDots' CTO Yair Green has provided insights on SASE, the future of network security.
20th March, 2020 -
Securing Kubernetes and the Container Landscape Read our latest article to find out more about securing your Kubernetes deployments and container landscape.
13th March, 2020 -
Passwords Still Dominant Authentication Method, Top Cause of Data Breaches Passwords Still Dominant Authentication Method, Top Cause of Data Breaches
9th March, 2020 -
Zero Trust Explained In this article we explain zero trust framework and what benefits it offers.
27th February, 2020 -
44% of Security Threats Start in the Cloud 44% of Security Threats Start in the Cloud
24th February, 2020 -
A New Decade of Challenges and Solutions for IT Professionals In this article, GlobalDots' solutions architect, Steven Puddephatt, offers his insight on future IT security challenges in 2020 and the decade ahead.
13th February, 2020