Stories by Robert Nobilo

Why it’s time to embrace a single vendor SASE solution or risk confusion
Tue, 9th Jul 2024
#
network infrastructure
#
it training
#
sd-wan
In the evolving cyber threat landscape, adopting a single vendor SASE solution is crucial for streamlined security and network management, enhancing protection and coherence.

Why organisations should transition to a single-vendor secure access service edge
Wed, 14th Feb 2024
#
vpns
#
network infrastructure
#
sd-wan
To combat escalating online threats, companies are shifting towards secure access service edge (SASE), enhancing user experience and operational efficiency across diverse architectures. As a single-vendor solution, SASE simplifies and optimises security for both on-campus and remote environments.

Applying Aristotle’s ‘First Principles’ to revolutionise cybersecurity
Wed, 20th Jul 2022
#
data protection
#
advanced persistent threat protection
#
cybersecurity
As the techniques of hackers continue to evolve and become more complex, our approach to security needs an overhaul as well.

Cyber security innovation has stagnated, and we need a new approach
Wed, 1st Jun 2022
#
advanced persistent threat protection
#
cybersecurity
#
software
The cyber security community's traditional approaches are failing. It's time to adopt a new approach to protect IT systems from the inside out.

Four ways to secure cloud workloads and your crown jewels
Tue, 29th Mar 2022
#
iam
#
edr
#
cybersecurity
Cloud workloads are vulnerable to a variety of attacks. Understanding why and adopting runtime protection is crucial.