Network Security

Can FCC's IoT Security Program Survive Its Own Investigation?
Endpoint & Device Security Can FCC's IoT Security Program Survive Its Own Investigation?

As the U.S. government pushes forward with initiatives to secure Internet-of-Things (IoT) devices, the U.S. Cyber Trust Mark program has emerged as a cornerstone of this effort. Today, we’re joined by Rupert Marais, our in-house security specialist with deep expertise in endpoint and device

29,000 Exchange Servers Unpatched for Critical Flaw
Identity & Access Management 29,000 Exchange Servers Unpatched for Critical Flaw

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. Today, we're diving into a critical issue affecting thousands of organizations worldwide: a high-severity

Nutanix Navigates DOGE Challenges and Boosts Growth
Infrastructure & Network Security Nutanix Navigates DOGE Challenges and Boosts Growth

Setting the Stage: Cloud Computing Under Policy Pressure In the dynamic realm of cloud computing, where innovation drives enterprise and government operations, a new challenge has emerged from the corridors of policy, creating significant hurdles for industry players. The Trump administration’s

How Is AI Being Weaponized for Sophisticated Cybercrimes?
Malware & Threats How Is AI Being Weaponized for Sophisticated Cybercrimes?

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. With the rapid advancements in AI technology and its increasing accessibility, there are growing concerns about its

How Does Storm-0501 Exploit Hybrid Cloud for Data Theft?
Infrastructure & Network Security How Does Storm-0501 Exploit Hybrid Cloud for Data Theft?

What happens when the very infrastructure meant to protect and scale an organization's data becomes the perfect tool for devastating theft? In today's digital landscape, hybrid cloud environments—blending on-premises and cloud systems—offer unmatched flexibility, but they also present a chilling

Why Legacy IT Upgrades Are a Critical CISO Priority
Infrastructure & Network Security Why Legacy IT Upgrades Are a Critical CISO Priority

Welcome to an insightful conversation on the critical topic of legacy IT systems and their impact on cybersecurity. Today, we're speaking with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. With

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later