The latest news articles
Westcon-Comstor broadens partner access and cybersecurity portfolio with Broadcom
Expands on Accelerate agreement and becomes inaugural Enterprise Security Group Catalyst Partner for the Asia Pacific (APAC) region KUALA LUMPUR, MALAYSIA – 6 September, 2024 – Westcon-Comstor, a g...
Real-time communication: the neglected security frontier
73% of business interactions use voice, but fraud is booming. We’ve outlined the dangers of RTC fraud, attack methods, and steps to secure voice and collaboration channels.
NIS2: Channel partners eye opportunity to help end-users navigate new cybersecurity rules
The vast majority of channel partners see the NIS2 Directive as an opportunity to grow revenues. Discover more in our latest survey.
Embrace the revolution: generative AI as an inherent tool for business
Generative AI transforms how we approach innovation. Unlike products with a learning curve, generative AI cybersecurity isn’t standalone. Find out how to embrace it.
NIS2: Shaping the Future of Cybersecurity Across Europe and Globally
In an increasingly digital world, cybersecurity has become a paramount concern for governments, organisations, and individuals alike. As cyber threats continue to evolve in complexity and frequency, i...
Westcon-Comstor's Record Revenue, Fueled by Cybersecurity & Networking
Explore Westcon-Comstor's record annual revenue, driven by robust growth in cybersecurity and networking. Join us to uncover the success story.
Westcon-Comstor earns AWS Security Competency Status – first IT distribution in APAC
Westcon-Comstor achieves AWS Security Competency Status, a groundbreaking achievement in IT distribution across APAC. Explore the significance of this milestone
Next gen SOC to better protect organisations
Explore 5 requirements for a next-gen SOC to bolster organizational security. From AI-powered alert handling to cost-effective scalability, discover the keys to protection.
Reinforced Zero Trust security offerings with Okta
Discover how Okta reinforces Zero Trust security. Explore advanced identity and access management for enhanced cybersecurity.
What are the 5 requirements for a next gen SOC to better protect organisations?
Explore 5 requirements for a next-gen SOC to bolster organizational security. From AI-powered alert handling to cost-effective scalability, discover the keys to protection.
Cybersecurity and Compliance: Navigating app security with F5
Find out how cutting-edge app security solutions address the latest security issues – while making sure your business stay’s compliant.