Blog

CDN Blog Series: Support Matters

CDN Blog Series: Support Matters

Article 5 of 6 Customer Support and Reliability The next step in our CDN blog series is to examine the importance of reliable customer support for maintaining optimal CDN performance. This article examines the support systems of Cloudflare and Akamai, highlighting...

read more
CDN Blog Series: User Experience

CDN Blog Series: User Experience

Article 4 of 6 Ease of Use and Integration After exploring performance and security in the previous articles in our CDN Series, it's important to consider ease of use and integration. This article evaluates how user-friendly Cloudflare and Akamai are, and how easily...

read more
CDN Blog Series: Security Insights

CDN Blog Series: Security Insights

Article 3 of 6 Cybersecurity Capabilities of Leading CDNs Building on our feature comparison in our previous article in our CDN Series, we delve into the cybersecurity strengths of Cloudflare and Akamai. This article explores the security features each CDN offers,...

read more
CDN Blog Series: Cloudflare vs. Akamai

CDN Blog Series: Cloudflare vs. Akamai

Article 2 of 6 Core Features and Performance of Cloudflare and Akamai With a solid grasp of CDN basics covered in the previous article in our CDN Series, we now compare two leading providers, Cloudflare and Akamai. This article highlights their core features and...

read more
Major milestone for NZ’s NCSC Malware Free Network

Major milestone for NZ’s NCSC Malware Free Network

Aotearoa New Zealand’s National Cyber Security Centre’s (NCSC) Malware Free Network (MFN) has reached a significant milestone: 10 million disruptions.   The NCSC, part of the Government Communications Security Bureau (GCSB), operates MFN, a service designed to detect...

read more
The Importance of Human Behaviour on Cybersecurity

The Importance of Human Behaviour on Cybersecurity

Our recent webinar with Scarlett Abbott highlighted the critical role of human behaviour in cybersecurity, here are our key takeaways from the discussion. Snap Decisions Can Have Severe Consequences The webinar demonstrated how easy it is to make mistakes with...

read more
Strengthen your Cyber Defence with Check Point Harmony

Strengthen your Cyber Defence with Check Point Harmony

Today's cyber security landscape is a battlefield and traditional security measures often fall short. That’s why we recommend Check Point Harmony, a comprehensive solution designed to protect your organisation's every digital touchpoint, here's how... What is Check...

read more
LastPass: Bridging the Gap in the Passwordless Journey 

LastPass: Bridging the Gap in the Passwordless Journey 

LastPass is like a digital safe for all your passwords. It locks away your login details and keeps them handy for when you need them. It's smart because it uses tough encryption to keep things secure.. Why LastPass Matters: - Centralised Security: LastPass keeps all...

read more
YubiKey: The Key to Robust Hardware-Based Authentication

YubiKey: The Key to Robust Hardware-Based Authentication

Continuing our series on the future of authentication, this article focuses on YubiKey, a pivotal tool in the transition towards passwordless security solutions. As we explore the functionalities and benefits of YubiKey, we understand its role in reducing dependency...

read more
Vendor Spotlight: Portnox – Simplifying Network Security

Vendor Spotlight: Portnox – Simplifying Network Security

Simplifying Network Security with Portnox  We like network security solutions that are not only comprehensive, but also straightforward to deploy and manage. This month, our Vendor Spotlight shines on Portnox, a leader in the network access control and...

read more