Blog by Marie-Bernette Smal

The Network Perimeter Is Gone

Comment(s)
The Network Perimeter Is Gone
Hybrid work has dissolved the traditional network perimeter. Learn why organisations must shift from perimeter-based security to a workspace-centric security model.

Why Identity Has Become the New Cybersecurity Battleground

Comment(s)
Why Identity Has Become the New Cybersecurity Battleground
Identity is the new cybersecurity battleground. Discover how Sophos ITDR helps businesses detect misconfigurations, stop stolen credentials, and protect digital identities.

The key roles of honeypots, tarpits and black holes in cybersecurity

Comment(s)

In the cybersecurity world honeypots represent traps designed solely to lure cybercriminals away from the real targets – sensitive corporate data repositories and vulnerable systems and applications.

Honeypots appear to those with malintent as actual computer systems carrying data and applications. H...

Significant security benefits from a 2FA and password management partnership

Comment(s)
Password management should be seen as essential and must apply to every employee. When teamed with 2FA, effective password management enables employees to safely share credentials while maintaining excellent standards in terms of password hygiene.

Disturbing victor in 2022 business risk survey

Comment(s)

It was expected that the effects of the Covid-19 pandemic and surges in Delta and Omicron infections would have resulted in Business Interruption (BI) maintaining its top spot in the 2022 rankings of the acclaimed Allianz Risk Barometer survey.

The annual Allianz survey and subsequent report identifi...