Blogs

Kite & Cyberbit Forge Strategic Alliance

Leicestershire, United Kingdom, September 30, 2024 — Kite, a leading independent IT cybersecurity distributor serving the UK and Ireland, has…

Read more

Simplifying the Stack

The security stack. It’s a crucial concept in IT – not just the cornerstone of an organisation’s cybersecurity landscape, but…

Read more

Kite & Uptycs Announce Strategic Partnership

London, UK — May 28, 2024 Uptycs, the premier cloud-native application protection platform (CNAPP), has announced a strategic partnership with…

Read more

Cybersecurity Predictions 2024

It’s that time of year again! As we emerge, blinking and bewildered, from the whirlwind of Christmas and New Year…

Read more

The Road to 90 Days

It is a truth universally acknowledged that if you’ve used the internet at any point, there’s a good chance (almost…

Read more

Hoxhunt Announces Partnership with Kite Distribution

Minneapolis, Minnesota – June 19, 2023 // Hoxhunt, the market leader in security behaviour change, today announced that the company…

Read more

SolarWinds Appoints Kite Distribution as New Value-Added Distributor

London – June 13, 2023 – SolarWinds, a leading provider of simple, powerful, secure observability and IT management software, announced…

Read more

The Beginner’s Guide to Detection and Response

Here’s a fun fact for you: did you know that an abbreviation is only an acronym if it can be…

Read more

Empowering Women: Insights and perspectives from the women at Kite

Today is International Women’s Day (8th March), a global day celebrating the social, economic, cultural, and political achievements of women….

Read more
Public Key Infrastructure

Demystifying Public Key Infrastructure

Public Key Infrastructure. Odds are good that a lot of people, upon reading those three words, have either checked out…

Read more

Cyber Security predictions 2023

Another year has come and gone and as we enter a new year, we have again asked our vendors to…

Read more

Breaching the Walls

Between the multitude of existing threat actors trying to breach an organisation’s network, a plethora of insider threats, and a…

Read more