A Safe Yet Connected Approach to Business

As businesses embark on a digital transformation journey, they also need to transform their network infrastructure as it forms the very foundation that will facilitate success in today’s cloud era. This is because the...

Hillstone Networks: Making the Most of the Present, Looking Forward to the Future

Hillstone Networks recently reached a milestone, having been named by Gartner as a Visionary in their 2021 Magic Quadrant for Network Firewalls. This recognition comes a full eight years since Hillstone first entered...

Do you Know Your Organisation’s Cybersecurity Score?

To gauge your understanding of the matter presented by this blog title, we must first answer the question, “What is a cybersecurity score?” A cybersecurity score, also known as a cyber risk score, is a number that...

What Makes Companies Vulnerable to Ransomware Attacks?

In the world of cybersecurity, we are living in unprecedented times. Ransomware attacks are particularly rampant, generating up to USD $350 million in 2020, a 311% increase over the previous year – leading to the...

The Future of Work Is Under Attack, and Intrinsic Security Is the Best Defense

Cyberattacks are and will continue to be a major concern for businesses big and small—and that is particularly true for enterprises in Asia, which has become a hotbed for cybercriminals and all sorts of malicious actors....

The SUSE Linux Enterprise: The Modern, Adaptable OS Every Organisation Needs

In this day and age of modernisation, you need more than just a run-of-the-mill server. What you need instead is an Operating System (OS) that can adapt to any and all environments, is optimised for performance, reliability and...

For Organisations That Find Containers Too Difficult to Implement and Maintain, Fully Managed Container Environment Services May Be the Answer

Container technologies have definitely been a game-changer for today’s cloud- and software-centric organisations. The key to the success of containers lies in the fact that they are open-source and add tremendous...

Three Critical Requirements You Need to Protect Your Endpoints From Ransomware

In today’s age of remote working, it has become more important than ever for organisations to ensure that their employees have strong cybersecurity measures in place. Endpoint security is perhaps the most crucial measure...

Integrating Graphs Into Your Existing Database

Tried and tested relational databases such as Oracle are trusted by enterprises for a reason. When we talk about making the shift to a graph database, we aren’t discounting the benefits that RDBMS provides for organisations...

How Should You Deal With Connected Data?

Data is everywhere. It surrounds us and encapsulates our lives. As humans living in a modern world, we generate tons of data every single day. But data is just data if it’s never connected. The value of data resides in the...