Security

Huawei controversies timeline

America\’s accusatory tone against Huawei is nothing new – read on for our extensive list of controversies pinned to the company Chinese telecommunications and consumer electronics manufacturer Huawei has found itself at the center of a long list of controversies in recent months. Far and away the leader in 5G network infrastructure, the company\’s business […]

Huawei controversies timeline Read More »

Inside the biometrics of those post-Brexit blue passports

The Entrust founder behind the UK\’s original e-passport and his successor at Gemalto discuss developments in passport security During the 2016 EU referendum campaign, one of the most emotive issues for Eurosceptics was the chance to reintroduce navy blue passports. It was also among the most irrational, as the EU had never mandated burgundy passports and the UK

Inside the biometrics of those post-Brexit blue passports Read More »

Office 365- Trust, Security, and Compliance

Office 365 is a security-hardened service, designed following the Microsoft Security Development Lifecycle. We bring together the best practices from two decades of building enterprise software and managing online services to give you an integrated software-as-a-service solution. At the service level, Office 365 uses the defense-in-depth approach to provide physical, logical, and data layers of

Office 365- Trust, Security, and Compliance Read More »

The Current State Of Email Security

Today, most companies around the globe rely primarily on email for communication with clients, colleagues, suppliers and other business affiliates. However, many businesses and organizations fail to realize the threats they face by not safeguarding their organizations against increasing email attacks. In many cases, most IT security managers in these organizations do know that email

The Current State Of Email Security Read More »

Email Security in a Zero Trust World

To tackle today’s cyber threats, IT security leaders must rethink traditional security strategies. Email security in particular has become a victim of its own success and requires a radical rethink, having played a key role in several high-profile security breaches. Today’s threats, like spear-phishing, are designed to bypass traditional Secure Email Gateway defenses, often taking

Email Security in a Zero Trust World Read More »

It Guide For Mobility: Making The Case To Security Leaders

Modern organizations are expanding mobility initiatives across virtually every business function. According to Cisco’s 2015 Mobility Landscape Survey, 72 percent of business leaders believe mobility is a strategic imperative for their organization’s success. In fact, in many businesses today, line-of-business (LoB) leaders are increasingly funding and making decisions about mobile applications and solutions. But mobile

It Guide For Mobility: Making The Case To Security Leaders Read More »