Sign up to our Newsletter
Technology, security threats and competition – they all change rapidly and constantly. Your security stack must therefore be ahead of every emerging threat, but just as importantly, enable full-speed business processes by reducing friction in critical workflows.
Explore our full library
SMBleed: A New Critical Vulnerability Affects Windows SMB Protocol
It can’t have escaped everyone’s attention, since the move to the cloud the number of data breaches has gone through the roof.
In this article, GlobalDots’ Solutions Architect Steven Puddephatt discusses why this is happening, why workplace policy won’t fix it, and what your organization can do to reduce the risk of being next.
VMware to Acquire Kubernetes Security Firm Octarine
Business expansion usually leads to an increase in users and employees accessing various applications and platforms from many devices. With an IAM framework in place, companies can control user access to critical information within their organizations.
Neglected Infrastructure, Invasive Tech to Plague Infosec in 2022
In this article, GlobalDots’ CTO Yair Green has provided insights on SASE, the future of network security.
Passwords Still Dominant Authentication Method, Top Cause of Data Breaches
In this article, GlobalDots’ solutions architect, Steven Puddephatt, offers his insight on future IT security challenges in 2020 and the decade ahead.
Enterprises are exposed to a variety of security risks stemming from the fact that access to internal applications opens up the entire network to attack. To counter these challenges, enterprises have started to rely on zero trust security. In this article we’ll discuss zero trust security implementation.
Cloud Security Posture Management (CSPM) automatically assess your cloud environment against best practice and security violations to provide the steps required to remediate them – often through autom