The evolution of zero trust

Dave Russell, Vice President, Enterprise Strategy at Veeam explores how zero trust security processes have evolved in recent years and how in a landscape where the benchmark for security is constantly shifting, zero trust must continue to adapt in order to survive.  

Ransomware Reality is Biting, so How do Businesses Bite Back?

It’s up to every organisation across every industry to invest in modern data protection practices to minimise the impact of ransomware attacks. Viewing attacks as an inevitability is the first step towards creating a more cyber-secure culture, with employees who are more educated and aware of ransomware. At the same time, businesses need to have the right safeguards in place to minimise disruption, including anti-virus software and firewalls, plus continuous backup and recovery to offer adequate insurance against the crippling effects of ransomware.

An Edge Computing Breakup: Out with the Old, and In with the New

When COVID-19 arrived in early 2020, enterprises’ first priority was to patch together a communications and information-sharing infrastructure that could sustain operations until work could return to normal. More than a year later, returns are on hold, and enterprises are rethinking their visions of “normal.” They’re reimagining their workplaces and their business practices, embracing more flexible models that take advantage of the benefits of edge technologies.

Multi-Cloud Requires Impeccable Digital Hygiene

Businesses looking to deliberately form a multi-cloud strategy must first ensure that their standards of digital hygiene including cybersecurity protocols, tracking, clear roles and responsibilities are fit for purpose. This is fundamental to the success of reaping the very real benefits of, while managing the potential risks in terms of cloud security and cost containment.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines