Certes Networks
Certes Networks
Blog Post

New blog articles detected.

  • GDPR and New York Cybersecurity Regulations – Why Encryption is an Essential Requirement
    Introduction The General Data Protection Act (GDPR) will take effect on May 25, 2018, replacing the current Data Protection Directive 95/46 in the European Union. This will introduce a number of new requirements regarding data control for organizations to manage.… The post GDPR and New York Cybersecurity Regulations – Why Encryption is an Essential Requirement appeared first on Certes Networks.
Certes Networks
Certes Networks
Blog Post

New blog articles detected.

  • Security weaknesses leaked by hacking group?
    Hammering home the message that the financial services industry is one of the biggest targets for hackers, it was recently reported that a huge range of security weaknesses affecting bank transfers had potentially been leaked online by a hacking group.… The post Security weaknesses leaked by hacking group? appeared first on Certes Networks.
Certes Networks
Certes Networks
Blog Post

New blog articles detected.

  • The Cyber Threat is Real
    The cyber threat is real Last year saw over 1,000 recorded data breaches suffered by US companies and government agencies – a 40% increase on 2015. So with 2016 being the worst year on record for data breaches, General Data… The post The Cyber Threat is Real appeared first on Certes Networks.
Certes Networks
Certes Networks
YouTube Video

New YouTube videos detected.

  • Certes Networks' Zero-Trust WAN Solution Demo
    Protect any enterprise data communications traffic over any WAN link, with 'Bring Your Own Trust' that reduces risk and puts you in control of keys and policies. Learn more at Certesnetworks.com
Certes Networks
Certes Networks
YouTube Video

New YouTube videos detected.

Certes Networks
Certes Networks
YouTube Video

New YouTube videos detected.

  • Shrink the Exploding Attack Surface - Certes & Intellyx
    Visit http://certesnetworks.com to learn more about cryptographic segmentation solutions from Certes The enterprise attack surface has exploded in recent years. More users on more devices in more locations are able to access ever more sensitive enterprise applications. The result is that the number of targets for attackers has gone up dramatically. The expanding attack surface has been dubbed a ...
Certes Networks
Certes Networks
YouTube Video

New YouTube videos detected.

  • Certes Networks and Forrester Webinar: Reducing the Attack Surface
    The attack surface of enterprises has exploded in recent years, thanks to widespread IT sprawl. IT environments have evolved with rapid digitization and application roll-out, Cloud adoption, proliferating devices, and application access extended to users of all types inside and out. Yet foundational IT security architectures have remained largely the same: Perimeter-focused designs and security po...
Certes Networks
Certes Networks
YouTube Video

New YouTube videos detected.

Certes Networks
Certes Networks
YouTube Video

New YouTube videos detected.

  • Halt the Hackers Before They Strike Your Retail Operations
    Protecting customer details, payment card information and transactional data is now a bigger IT concern than ever for retail organizations. As breach after breach has shown, the old security architecture is no longer adequate for protecting retailers from the wave of hacking attacks hitting companies around the globe. No network or users can truly be trusted and companies should assume that dat...
Certes Networks
Certes Networks
Blog Post

New blog articles detected.

  • General Data Protection Regulation (GDPR) is coming
    With consumers’ personal data being compromised on a near daily basis, it is unsurprising that the EU is preparing to get tough on businesses that do not protect their customers. The result is that as of May 2018 any company… The post General Data Protection Regulation (GDPR) is coming appeared first on Certes Networks.
Certes Networks
Certes Networks
Blog Post

New blog articles detected.

  • Why employees are the weakest link in your network
    You may assume that each of your employees is aware of the potential threat of phishing attacks or email based viruses whilst on the company network, but a recent report suggests that organizations must take far more effective steps to… The post Why employees are the weakest link in your network appeared first on Certes Networks.
Certes Networks
Certes Networks
Blog Post

New blog articles detected.

  • Go Phish: Protecting your enterprise from the weakest link
    According to a recent report by PhishMe, 91% of cyber attacks begin with a phishing email. The attack method remains one of the most successful available to hackers as it exploits the inherent weakness of individual users. Since the advent… The post Go Phish: Protecting your enterprise from the weakest link appeared first on Certes Networks.
Certes Networks
Certes Networks
Blog Post

New blog articles detected.

  • A major bank will fail in 2017
    2016 saw household name after household name hit the headlines as some of the world’s most significant brands fell victim to cyber-attacks, and 2017 is expected to follow suit. Eyes will be on the banking sector in particular, especially following… The post A major bank will fail in 2017 appeared first on Certes Networks.
Certes Networks
Certes Networks
Blog Post

New blog articles detected.

  • Why Layer 4 Encryption succeed where traditional encryption fails
    The introduction of the General Data Protection Regulation (GDPR) in 2018 will provide additional pressure on organizations to comply with the requirements. So, how can organizations secure their networks to comply with regulations without compromising their operations? For many businesses,… The post Why Layer 4 Encryption succeed where traditional encryption fails appeared first on Certes Network...
Certes Networks
Certes Networks
Blog Post

New blog articles detected.

  • Why traditional encryption has failed
    The increasingly dispersed and diverse infrastructure models that are commonplace in virtually every organization make the task of defining a robust cyber-security strategy that truly protects an organization a challenge for any CISO. Add to this the arrival of the… The post Why traditional encryption has failed appeared first on Certes Networks.
Certes Networks
Certes Networks
Blog Post

New blog articles detected.

  • 500 million Yahoo! accounts caught by phishing
    It hasn’t been a good six months for Yahoo! 2016 saw the details emerge of not one, but two data breaches spanning back as far as 2013. It has recently been revealed that Russian hackers are thought to be behind… The post 500 million Yahoo! accounts caught by phishing appeared first on Certes Networks.
Certes Networks
Certes Networks
Blog Post

New blog articles detected.

  • Data breach pandemic reaches record level in US
    As far as data breaches go, hackers threw everything they had at the private sector last year. According to a study from the Identity Theft Resource Center, U.S. organizations experienced 1,093 data breaches in 2016 – an all-time high. Overall, the number of… The post Data breach pandemic reaches record level in US appeared first on Encryption without Compromise.

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.