News
Stay up-to-date with key insights and tips from Integra Networks related to cyber security, cloud computing, end user computing, and IT infrastructure solutions for government and private sector organizations.
The Future of Work Must be Agile for Employees and Businesses to Thrive
Last week I attended the Convenzis Healthcare Digital Technology event in London. Attended by 100+ professionals from NHS England, NHS Improvement, NHS Digital and The Department of Health, the event focused on several digital advancements taking place across the...
10 Tech Predictions for 2020 and Beyond
#1 - 2020 will be the Year of 5G With speeds of up to 10 gigabits per second, 5G is set to be as much as 100 times faster than 4G. It’s nearly impossible to outline all the changes we’ll see as a result of 5G technology and most seem straight out of science fiction...
Am I Smart or Just Lucky? Understanding Your Process Integrity Risk with Tenable Lumin
Business system risk and process integrity risk are two essential metrics for a mature risk-based vulnerability management practice. With new assessment maturity scoring, Tenable Lumin now gives you insights into both. Risk-based vulnerability management requires...
What You Need to Know About Ethical Hacking
Ethical hacking, in which an organization uses the tools and practices of cyberattackers against their own systems, can be a valuable part of your cybersecurity strategy. Cybersecurity has been important, in some form or another, since the birth of the internet. In...
From the enterprise to the IoT edge, we have you covered with SD-WAN
Deploying a security patch to address a new vulnerability. Performing critical software updates or conducting network performance tests. As enterprises try to expand the scope of deployment from carpeted areas to outdoor environments – for example, a financial or...
An Autonomous Robot with A ThinkPad Brain
Along with the rise of IoT, AI, and new technologies that are changing the world, is autonomous robotic technology. You can imagine the excitement around events like ABU Robocon3 where universities and academies from all over the world come together to see if their...
3 Reasons Why Your Business Is Vulnerable to Cyber Threats
Today’s cyber landscape changes in the blink of an eye. It’s critical to understand why your business is vulnerable – so you can take the right steps to protect it. According to Ponemon Institute’s report, Measuring & Managing the Cyber Risks to Business...
How Vulnerability Scanning Is Used for Penetration Testing
By the time a data breach occurs, it may be too late to measure the effectiveness of your vulnerability management program. Penetration testing can help detect weaknesses – before threat actors do. Here’s how to get started. Looking to proactively measure the...
Knative: running serverless applications on top of Kubernetes
The last decade has been quite disruptive in terms of the evolution of both applications and infrastructure paradigms. We have moved from monolithic applications to microservices and serverless functions. Equally, on the platform and infrastructure side, we moved...
Smarter Technology for All Starts on the Inside
“Smarter Technology for All starts on the inside,” says Lenovo’s CIO, Art Hu. “It’s not just about creating new technology and products for customers and clients; it’s also about using technology to transform business. As consumers across industries increasingly...