Stories by George Tsoukas
![Story image](../../../../../uploads/story/2022/06/29/preview_GettyImages-1273876258__1_.webp)
What CISOs think about cyber security, visibility and cloud
Wed, 29th Jun 2022
#
digital transformation
#
iaas
#
multi-cloud
Cloud adoption is growing rapidly in Asia Pacific, but security concerns remain as 72% of adopters do not have all workloads secured.
![Story image](../../../../../uploads/story/2022/05/20/preview_pic_-_George_Tsuokas__3.webp)
Let’s clear the cloud visibility haze with app awareness
Fri, 20th May 2022
#
migration
#
iaas
#
multi-cloud
Organizations embracing cloud computing face challenges with identifying applications and filtering traffic. A cloud suite can provide a solution.
![Story image](../../../../../uploads/story/2022/04/27/preview_compatible_pic_-_George_Tsuokas__3.webp)
Why it's essential to focus on security fundamentals
Wed, 27th Apr 2022
#
dr
#
encryption
#
mfa
The White House has issued comprehensive cybersecurity recommendations to protect against potential Russian cyber-attacks.
![Story image](../../../../../uploads/story/2022/03/25/preview_GettyImages-1331943958.webp)
How to prevent ransomware devastation
Fri, 25th Mar 2022
#
malware
#
dr
#
ransomware
The devastating effects of ransomware have grown over the past two decades from opportunistic to carefully orchestrated attacks.
![Story image](../../../../../uploads/story/2022/03/03/preview_GettyImages-1354205086.webp)
Why doubling down on corporate defence works so well
Thu, 3rd Mar 2022
#
uc
#
data analytics
#
martech
The security operations centre has come a long way since the early 2000s. It wasn’t even called a SOC in those days.
![Story image](../../../../../uploads/story/2022/01/25/preview_GettyImages-1157016421.webp)
Why network visibility must be the foundation of Zero Trust architecture
Tue, 25th Jan 2022
#
malware
#
data analytics
#
martech
US Presidential Executive Order 14028 directs federal agencies to transition to a Zero Trust Architecture for cybersecurity.
![Story image](../../../../../uploads/story/2021/12/02/preview_GettyImages-1297147973.webp)
Dark clouds on the horizon: How to close the gaps in cloud security
Thu, 2nd Dec 2021
#
data analytics
#
martech
#
planning
Cloud security is more trusted than ever, but there are still gaps that need to be addressed. Find out what they are in this article.
![Story image](../../../../../uploads/story/2021/11/18/preview_GettyImages-1018651722.webp)
What is OT security and how does it differ from IT security?
Thu, 18th Nov 2021
#
breach prevention
#
cybersecurity
#
gigamon
Let’s consider what OT is, its relationship with IT, and the common problems people experience in working with it.
![Story image](../../../../../uploads/story/2021/10/22/preview_GettyImages-1187729700.webp)
What exactly is 5G security, and why is it essential?
Fri, 22nd Oct 2021
#
uc
#
iot
#
5g & beyond
Many things that make 5G so appealing, like the decreased latency and increased bandwidth, are also threats to security.
![Story image](../../../../../uploads/story/2021/10/12/preview_GettyImages-1213867496.webp)
How cloud monitoring delivers both challenges and benefits
Tue, 12th Oct 2021
#
data analytics
#
martech
#
planning
To ensure that cloud initiatives are performing to their potential, cloud monitoring takes several different forms.
![Story image](../../../../../uploads/story/2021/08/23/preview_GettyImages-1153240263.webp)
Three ways Shark Week mirrors cybersecurity marketing
Tue, 24th Aug 2021
#
breach prevention
#
cybersecurity
#
gigamon
Here are three ways that myths are spread by Shark Week and how they are analogous to the myths currently percolating in cybersecurity marketing.
![Story image](../../../../../uploads/story/2021/07/22/preview_GettyImages-1219660935.webp)
What Is TLS 1.2 — and why should we still care?
Fri, 23rd Jul 2021
#
breach prevention
#
cybersecurity
#
gigamon
TLS 1.2, the improved version of the Transport Layer Security protocol, is crucial for data security as TLS 1.0 and 1.1 become unsupported.
![Story image](../../../../../uploads/story/2021/04/12/preview_cloud8.webp)
How multi-cloud visibility ensures business continuity
Mon, 12th Apr 2021
#
hybrid cloud
#
martech
#
multi-cloud
New technology solves the visibility gap in hybrid clouds, providing a single view of data in motion and optimising user experience.
![Story image](../../../../../uploads/story/2021/03/02/preview_GettyImages-1197955157.webp)
Three security essentials for financial services
Wed, 3rd Mar 2021
#
uc
#
devops
#
fintech
Financial services must adapt to the current global upheaval by prioritizing customer experience and security, while optimizing costs.
![Story image](../../../../../uploads/story/2021/02/11/preview_GettyImages-1188953848__1_.webp)
What cloud-native actually means
Fri, 12th Feb 2021
#
devops
#
apm
#
breach prevention
Although the benefits of the cloud-native approach are widely recognised, there is a lot of confusion about what cloud-native computing is.
![Story image](../../../../../uploads/story/2020/11/23/preview_GettyImages-1204545808.webp)
The ins and outs of cloud-native computing
Tue, 24th Nov 2020
#
devops
#
apm
#
breach prevention
Cloud-native computing is a way of thinking, as well as a computing architecture. But what are the benefits? #cloudcomputing #cloudnative.
![Story image](../../../../../uploads/story/2020/10/27/preview_GettyImages-1182211371.webp)
Why network monitoring and visibility are key to 5G success
Wed, 28th Oct 2020
#
uc
#
5g & beyond
#
breach prevention
Service providers must be prepared to offer unparalleled 5G experiences without compromising on speed, performance or security - all without breaking the bank.
![Story image](../../../../../uploads/story/2020/10/14/preview_digital_globe_team.webp)
Why IT and HR must work together to help businesses weather the storm
Thu, 15th Oct 2020
#
malware
#
breach prevention
#
zero trust security
Remote work is the new norm in Australia, but IT and HR teams must partner to ensure cybersecurity and employee well-being.
![Story image](../../../../../uploads/story/2020/10/06/preview_cybersecurity36.webp)
Network visibility is the crux of security in 2020
Thu, 8th Oct 2020
#
malware
#
vpns
#
zero trust security
The pandemic's push for remote work has heightened cyber risks. Companies must enhance network visibility to protect against escalating threats.
![Story image](../../../../../uploads/story/2020/08/13/preview_mobile_security.webp)
How businesses can lift protection against mobile threats
Mon, 31st Aug 2020
#
smartphones
#
breach prevention
#
ndr
Rise in personal phone use for work and mobile malware pose increasing risks to organizations, warns report. #cybersecurity.