Having an authentication authority within your infrastructure allows you to have a single source of truth to authenticate users for any asset, across your entire enterprise. This is a foundational…
As a managed service provider (MSP), your customers already expect you to keep their networks secure. But, how are you approaching your security offerings? Do you have standard services baked…
Analogue and ISDN telephony is a thing of the past – telephony today is mostly internet-based. Voice-over-IP telephony (VoIP) offers many advantages, but also presents new risks. secunet SBC provides…
Web applications play an important role in supporting e-commerce and key business initiatives. It is critical to incorporate web app scanning into your broader security program to keep them safe.…
In the wake of digitalisation, the trend towards mobile work practices is also leading to profound changes. Public authorities have been facing this challenge for quite a while and are…
The break/fix IT model was once considered the go-to. Not anymore. Proactive IT solutions quickly became the new norm, offering benefits to both technology solution providers (TSPs) and their clients.…
Based on extensive, up-to-date knowledge and experience from WithSecure consultants, threat hunters and incident responders, the report shows how attackers are bypassing cloud security – and what you can do…
Cybersecurity Through the Years As we look at the ever-increasing, technology-dependent cyber environment that impacts us all, one thing is clear – cyber-attacks are increasing year on year and are…
When an organization decides to modernize a Security Operations Center (SOC) or implement a more formal security program, they must make a number of important decisions. What workbench will they…
The latest findings in our ongoing threat intelligence efforts in the war between Russia and Ukraine, and a series of conclusions from its first four months reinforces the need for…
After a dynamic year for cloud native apps, Tenable has compiled a report focusing on trends and recommendations for companies to better secure their infrastructure. Report highlights include: Security team…
While money is the main asset banks are charged to protect, it isn't the only thing about which these institutions must be vigilant. The tremendous costs, risks, and damage to…