Blogs

It's Your Data in Their Clouds
With the adoption of remote working accelerating, even necessitating, the shift to the cloud, it should come as no surprise that more data is being stored in the cloud, and often across multiple providers, but who is responsible for the data once it’s in the cloud? Is it your organisation, or the cloud provider?

Network Security: Protect your customers’ fleet
That’s right; we’re doing a Star Trek blog. Just like the average Starfleet ship, a company’s network is a point of huge strategic value, and the cost of a security breach is potentially disastrous. So how can you utilise MSP offerings to make the ship impenetrable to intruders, but still accessible for approved users? Let’s take a look.

What Lurks in the Dark?
That may seem like a melodramatic title, but now that we’ve got your attention: ransomware. When a cyber-attack happens, the question of ‘why’ is usually somewhere near the bottom of the list of immediate priorities, but it is still important, and with a ransomware attack, the answer is usually relatively simple: money. What can IT leaders learn from the SPAR ransomware attack? Read our blog to find out.
Assets

2022 Market Guide for Zero Trust Network Access
Want to learn more about Zero Trust Network Access (ZTNA)? Gartner have released their brand new ZTNA market guide for 2022. You can download your complimentary copy from Appgate today. Understand the benefits and risks of ZTNA, how it is a component of a Zero Trust strategy, ZTNA uses cases, market recommendations, and much more.

2022 Thales Data Threat Report
As the pandemic continues to affect both business and personal lives, expectations of a ‘return’ to pre-pandemic conditions have faded from most plans. Underlying trends that have always driven information security, such as new technologies, greater compliance mandates and more severe security incidents, continue to be significant change agents. This report illustrates these trends and changes.

2022 Global State of Security Report: UK
Read the new report from CyberRisk Alliance and Infoblox and get illuminating survey findings from 11 countries across the globe on the current state of security two years after the COVID pandemic began, with a special focus on the U.K. You'll discover the top security issues exacerbated by pandemic disruptions, survey results on financial losses - and the associated threats that caused them and more.
To access this resource, please fill in your details.
Videos

Immersive Labs - Crisis Simulator
Immersive Labs’ Crisis Simulator drops teams into truly dynamic scenarios based on real crises. Unlike linear tabletops, Immersive Labs' content reflects how a crisis unfolds in the real world – you never know what wicked problem you’ll face next.

Hack Yourself with Breach and Attack Simulation
Safely simulate attacks on your live network, measure and optimise SecOps spend, and continuously test your security posture with Threat Simulator from Keysight Technologies. Prove you're safer than you were yesterday with this Breach and Attack Simulation tool.

Passwordless for Trusted Workplace Identities
Entrust's passwordless solution creates a secure digital identity on the employee’s mobile phone using a PKI credential that is unlocked with biometric authentication, such as fingerprint or facial recognition.
To access this resource, please fill in your details.
Kite Documents

Kite Vendor Portfolio 2022
Download our portfolio to learn all about our vendors in one handy document.

Kite NDA Form
Download this form to access our non-disclosure agreement document.

Kite Terms & Conditions
Download this form to access our terms and conditions document.