The Cyber Source blog

Cyber Security (and NOC Knowhow), in plain English

Zscaler cloud security - A list of 'must-have' resources

By Comtact September 11, 2019

With more and more users working remotely and apps rapidly moving towards the cloud, it's..

Zscaler introduction to secure cloud transformation

By Comtact September 4, 2019

We all remember the days when cyber security was simple, when firewalls and Anti-Virus provided..

Can you deploy Office 365 over legacy IT architecture?

By Comtact May 9, 2018

It is no wonder that so many organisations are migrating over to Office 365, with clear user..

Solving network latency issues with Office 365 migration

By Comtact January 23, 2018

In operating legacy, or hybrid network architectures, many enterprises have experienced..

Moving to Office 365? What are the issues facing your network?

By Comtact December 11, 2017

Many companies make the move to Office 365 because - as Microsoft says - you can access your..

What is Zscaler Cloud Sandbox? Defending against ransomware

By Comtact May 26, 2017

Following analysis of the WannaCry ransomware attack, Zscaler determined that the initial..

Deploying Office 365? How to securely migrate from Exchange

By Comtact October 12, 2016

The Challenge of Running Cloud Applications Securely

Organisations are rapidly adopting Office..

Sign-up for weekly updates

Recent Posts

Recent Posts