<
>

Secure Authentication Explained

According to Mazhar Zoaib Ali, Microsoft Malaysia's General Manager of Customer Success, “Secure authentication is an essential piece of the cybersecurity puzzle.” He pointed out that it is, in essence, the first...

Information Protection Explained

When a stranger tries to get inside our house, our instinct is to ask, “Who are you?” Your systems should be doing the same thing by default but this time for everyone—absolutely everyone! This is the purpose of...

Modern Approaches to Cybersecurity Explained

Threat actors are everywhere, and they are actively targeting businesses regardless of their size and industry. Yours could be next—that is, unless you make cybersecurity a top priority. And, as you do so, look to implement...

Oh Snap! More Lemmings

Fresh off our recent disclosure (Pwnkit), the Qualys Research Team announced that it has discovered multiple vulnerabilities in the snap-configure function on Ubuntu operating systems, the most important of...

Cohesity Digital Awareness Introduction Video

Can You beat cybercriminals at their own game? Assess your backup vulnerability now: https://aopginsights.com/ransomware-recovery-readiness-assessment-does-your-backup-really-protect-you-from-ransomware/  

Fortinet Secure SD Wan Explained Video

IT Explained: Explaining the Fortinet Secure SD Wan

Fortinet Security Fabric Explained Video

IT Explained: Explaining the Fortinet Security Fabric

Tenable.ep Explained (Thai)

Every company right now is feeling the strain of a fragmented workforce. Whether you have teams working in the office on newly designed shift patterns intended to minimise contact, an entire workforce working remotely from home,...

Tenable.ep Explained (Bahasa Indonesia)

Every company right now is feeling the strain of a fragmented workforce. Whether you have teams working in the office on newly designed shift patterns intended to minimise contact, an entire workforce working remotely from home,...

AI Driven Security Explained

AI-driven security operations is an approach in the implementation of security within an organisation that leverages the power of artificial intelligence which includes machine learning, advanced data analytics and automation.