Blog

CDN Blog Series: Cloudflare vs. Akamai

CDN Blog Series: Cloudflare vs. Akamai

Article 2 of 6 Core Features and Performance of Cloudflare and Akamai With a solid grasp of CDN basics covered in the previous article in our CDN Series, we now compare two leading providers, Cloudflare and Akamai. This article highlights their core features and...

read more
Major milestone for NZ’s NCSC Malware Free Network

Major milestone for NZ’s NCSC Malware Free Network

Aotearoa New Zealand’s National Cyber Security Centre’s (NCSC) Malware Free Network (MFN) has reached a significant milestone: 10 million disruptions.   The NCSC, part of the Government Communications Security Bureau (GCSB), operates MFN, a service designed to detect...

read more
The Importance of Human Behaviour on Cybersecurity

The Importance of Human Behaviour on Cybersecurity

Our recent webinar with Scarlett Abbott highlighted the critical role of human behaviour in cybersecurity, here are our key takeaways from the discussion. Snap Decisions Can Have Severe Consequences The webinar demonstrated how easy it is to make mistakes with...

read more
Strengthen your Cyber Defence with Check Point Harmony

Strengthen your Cyber Defence with Check Point Harmony

Today's cyber security landscape is a battlefield and traditional security measures often fall short. That’s why we recommend Check Point Harmony, a comprehensive solution designed to protect your organisation's every digital touchpoint, here's how... What is Check...

read more
LastPass: Bridging the Gap in the Passwordless Journey 

LastPass: Bridging the Gap in the Passwordless Journey 

LastPass is like a digital safe for all your passwords. It locks away your login details and keeps them handy for when you need them. It's smart because it uses tough encryption to keep things secure.. Why LastPass Matters: - Centralised Security: LastPass keeps all...

read more
YubiKey: The Key to Robust Hardware-Based Authentication

YubiKey: The Key to Robust Hardware-Based Authentication

Continuing our series on the future of authentication, this article focuses on YubiKey, a pivotal tool in the transition towards passwordless security solutions. As we explore the functionalities and benefits of YubiKey, we understand its role in reducing dependency...

read more
Vendor Spotlight: Portnox – Simplifying Network Security

Vendor Spotlight: Portnox – Simplifying Network Security

Simplifying Network Security with Portnox  We like network security solutions that are not only comprehensive, but also straightforward to deploy and manage. This month, our Vendor Spotlight shines on Portnox, a leader in the network access control and...

read more
Fortinet or Check Point?

Fortinet or Check Point?

In recent cybersecurity news, vulnerabilities in Fortinet's FortiOS and FortiProxy systems have been exposed, leaving approximately 150,000 systems vulnerable to exploitation. This critical security issue, known as CVE-2024-21762, allows attackers to execute code...

read more
Navigating Cyber Threat 2024: Ethical Hacking

Navigating Cyber Threat 2024: Ethical Hacking

In the fast-paced world of cybersecurity, malicious actors continuously devise new methods to breach and compromise digital assets. The fallout from these malicious activities can be hefty, often resulting in significant financial and reputational damage. Here at...

read more