In terms of digital security, firewalls are network security systems which are often considered the first line of defence for any infrastructure. Unsure whether your firewall is up to scratch? Take a look at our guide and best practices to get the most out of your firewall.
With high profile data breaches happening at an alarming frequency, encryption has become a key building block for information security. In our latest Q&A, we spoke to Lee Davis, Regional Sales Manager from Thales eSecurity, to clarify key terms and talk best practice for securing your data.
Data Protection Day, (also known as Data Privacy Day), was launched by the Council of Europe in 2006 in an effort to raise public awareness of privacy and usage of personal information. In honour of Data Protection Day, we are taking a look back at some of our previous entries on this diverse subject.
Software code signing is the process of verifying software to ensure it has come from a legitimate source. In this blog we discuss the importance of software code signing and the implications of not maintaining certificates.
It could be said that data security has been one of the main talking points of 2018 and will continue to be in 2019 and beyond. In honour of Halloween, we are taking a look at some of the scariest and biggest data security scares so far this year.
In our first Q&A in the series, we spoke to Sean Newman, Product Management Director at Corero Network Security, to get some further clarity on distributed denial of service (DDoS) attacks, and how organisations can protect themselves.
KT Secure partnered with macmon secure for our inaugural security event at The Gherkin, covering key topics surrounding the Internet of Things and critically how to secure it. Take a look at the presentation slides for more information on this fascinating and constantly evolving subject.
Network Access Control, referred to as NAC, consolidates all endpoint security to provide networks with a secure and reliable level of controlled access. We've outlined a few key elements to help you understand this network security solution.
In this webinar, KT Secure and macmon secure UK experts discuss network access control best practice. Also reviewing real examples of poor network security which have resulted in significant vulnerability exploits.