Certes: Rebranding for the Future - Certes
Traditionally cybersecurity has centred on safeguarding the perimeter of a network. However, as data breaches and ransomware attacks continue to surge, the limi...
Read moreTraditionally cybersecurity has centred on safeguarding the perimeter of a network. However, as data breaches and ransomware attacks continue to surge, the limi...
Read moreThe recent ransomware attack on the Colonial Pipeline shook the cybersecurity landscape, forcing a re-evaluation of our national infrastructure’s vulnerability....
Read more
AI is only as good as the data it learns from, and attackers are already exploiting that fact. Data poisoning is quickly becoming one of the most dangerous and ...
Read more
The stakes in cybersecurity have never been higher. Attacks are no longer about brute force break-ins; they are about slipping through the cracks of traditional...
Read more
Acting quickly to a data breach makes a big difference. But how do you know that a data breach is happening? The meantime it takes companies to identify a breac...
Read more
Too many CFOs and CISOs still believe their service providers have security under control. They don’t. Every time your data leaves your environment unprotected,...
Read more
Data Sovereignty: Protecting Your Data in a Globalised World Data breaches have become an all-too-common occurrence, affecting even the biggest tech giants. In ...
Read more
AI is becoming a major part of everyday technology, creating new opportunities across industries. Financial institutions use AI to refine decision-making proces...
Read more
Law Enforcement Agencies Are a Vulnerable Target Author: Simon Hill, Legal & Compliance Director, Certes Networks The Criminal Justice Information Services ...
Read more
For years, cybersecurity was seen as an IT problem. But not anymore. In the age of DORA, GDPR, and NIS2, data protection has become a board-level obligation. If...
Read more
The Importance of Protecting Active Directory from Attack: What’s at Stake? Active Directory (AD) plays a crucial role in managing users, devices, and services ...
Read more
Cybersecurity strategy has typically revolved around a single principle for too long: keep the bad guys out. Firewalls, intrusion detection, endpoint protection...
Read more
How SD-WAN Can Improve the Finance Customer Experience Author: Paul Vidic, Director, Certes Networks The customer experience (CX) is the interaction between an ...
Read more
Certes Networks Signs Distributorship Agreement with Largest Value-Added Technology Distributor in Turkey August 3, 2020 – Certes Networks, a leading global dat...
Read more
If your business still believes perimeter defenses will protect it from a breach, you’re already exposed. You’ve invested in firewalls, VPNs, endpoint protectio...
Read more