Rick Mur, GNX: A new form of connectivity

TechForge recently caught up with GNX’s CTO and co-founder, Rick Mur, to discuss how organisations around the world are dealing with the latest connectivity challenges. 

Can you tell us a little bit about GNX?

GNX is a global connectivity provider, which means that we provide enterprises with any type of data connectivity solution anywhere in the world. That ranges from Internet access at office buildings, to more advanced point-to-point solutions between data centres...

Cohesity brings Intel’s confidential computing capabilities to Cohesity Data Cloud

Cohesity, a specialist in AI-powered data security and management, has collaborated with Intel to bring Intel’s confidential computing capabilities to the Cohesity Data Cloud.

Leveraged with Fort Knox, Cohesity’s industry-leading cyber vault service, this data-in-use encryption innovation will be the first of its kind in the data management industry.

Together, Cohesity and Intel are solving one of the most pressing cybersecurity challenges for CIOs. Traditionally,...

Spike in cloud account compromises and email forwarding rule abuse detected

A graphic of a padlock.

Cybersecurity firm Red Canary has unveiled its sixth annual Threat Detection Report, examining the trends, threats, and adversary techniques that organisations ought to prioritise in the coming months and years.

The report tracks MITRE ATT&CK techniques that adversaries abuse most frequently throughout the year, and two new and notable entries soared to the top 10 in 2023: Email Forwarding Rule and Cloud Accounts. 

Red Canary’s latest report provides in-depth...

Rik Chorus, Kyndryl: How to defend against evolving cybersecurity threats

Rik Chorus, Kyndryl’s director of security and resiliency & networking and edge, Benelux, discusses how the firm is helping organisation’s navigate their way through an ever-changing tech and business landscape.

Can you tell us a little bit about Kyndryl and what you do at the company?

There are a few things that I think are really interesting and that set Kyndryl apart from everything I've seen in the market so far. One of the things is that Kyndryl, as the...

ManageEngine launches cloud-native Identity platform

Who are you? written in Scrabble tiles.

ManageEngine, the enterprise IT management division of Zoho Corporation, has launched of Identity360, its cloud-native identity management platform that addresses identity and access management (IAM) complexities arising within enterprise workforces.

ManageEngine also announced the addition of access certification and identity risk assessment functions to ADManager Plus, its on-premises identity governance and administration (IGA) solution. These two functions enhance the...

Cyber Security & Cloud Congress North America Begins in Just a Few Days

Cybersecurity & Cloud Congress North America

[SANTA CLARA, CA, May 10, 2023] – The Cyber Security & Cloud Congress North America (part of TechEx) is scheduled to take place on May 17-18 at the prestigious Santa Clara Convention Centre in California.

This technology event brings together industry experts, thought leaders and innovative companies to explore the latest advancements, challenges, and opportunities in the realm of cybersecurity and cloud computing. As the digital landscape continues to evolve rapidly,...

James Todd, KPMG: On automation and machine learning as the future of security 

James Todd, SecOps director at KPMG, describes his role as a merging of SecOps, security architecture, and cloud security. It is a particularly interesting crossing point with regard to automation. 

“It’s at that intersection of the cloud environment, being very much aligned to deploying everything as code,” says Todd. “A lot of automation is a big part of that. Being able to take dynamic action within a cloud environment is much easier and well-versed than within a...

Andrew Egoroff, ProcessUnity: On the increased cybersecurity threat and mitigating risks

Cloud Tech caught up with Andrew Egoroff, Senior Cybersecurity Specialist at ProcessUnity, to discuss the increased threat around the Russia-Ukraine crisis and how to mitigate risks from third parties.

A business can implement excellent internal cybersecurity measures, but a slip-up from a third-party vendor can have devastating consequences. ProcessUnity specialises in helping businesses determine what vendors carry the lowest risk.

“We try and evangelise the...

Ben Jenkins, ThreatLocker: Dealing with the scourge of ransomware

A padlock on a shed.

Threatlocker was founded in 2017. What was it set up to do?

Endpoint security, and we do that by following zero trust. Now, the problem is zero trust is not the best name to describe things. And it's kind of this industry buzzword or buzz term that's come out that we kind of had to stick to using because it’s what people know. But we don't like to describe things as zero trust. 

Essentially, we do it through four main pillars. So we have our application...