[{"itemUrl":"/security/are-firewalls-still-important-making-sense-of-networkings-greatest-security-layer-3641295/","headline":"Are firewalls still important? Making sense of networking's greatest security layer","metaKeywords":"firewall management,firewalls,DDoS attacks,Unified Threat Management,security,firewall management firm,firewall management systems","id":3641295},{"itemUrl":"/security/university-of-york-improves-security-with-vmware-nsx-3640491/","headline":"University of York improves data security with VMware NSX software defined networking","metaKeywords":"rdquo,micro segmentation,Clunes.

,Dr. Arthur Clunes,vmware,personal identification software,internally networked restrictions,student records","id":3640491},{"itemUrl":"/security/when-ransomware-strikes-how-uk-sme-coped-with-deadly-strike-on-its-data-3640211/","headline":"When ransomware strikes - how a UK SME coped with a deadly strike on its data","metaKeywords":"building consultancy,DMA Locker,UK-based building consultancy,ransomware,quiet evening stroll,simple endpoint client,unusually high price,common theme mong","id":3640211},{"itemUrl":"/security/bt-security-consultings-cyber-roadmap-is-it-more-than-sales-tweak-3639975/","headline":"BT Security Consulting's Cyber Roadmap - is it more than a sales tweak?","metaKeywords":"Cyber Roadmap,van Es,Guus van Es,Cyber Roadmap Consulting,BT,500-strong Security Consulting,beneficial market disruption,Consulting bigger innovation","id":3639975},{"itemUrl":"/security/hotel-sector-faces-cybercrime-surge-as-data-breaches-start-bite-3639710/","headline":"Hotel sector faces cybercrime surge as data breaches start to bite","metaKeywords":"Panda Security,credit card,hotels,hotel,studies recent attacks,credit card data,security firm Panda,smaller hotels,non-US hotel Mandarin","id":3639710},{"itemUrl":"/security/death-of-enterprise-vpn-if-remote-access-is-not-secure-what-comes-next-3639238/","headline":"Death of the enterprise VPN - if remote access is not secure what comes next?","metaKeywords":"Private Access,VPNs,remote access,Zscaler Private Access,traditional VPN,enterprise remote access,traditional VPN defence,Private Access client","id":3639238},{"itemUrl":"/security/data-breaches-2016-verizon-names-simple-failings-that-lead-data-loss-3639094/","headline":"Data breaches 2016 - Verizon names simple failings that lead to data loss","metaKeywords":"data breaches,Verizon,successful data breaches,real-world breaches,annual Data Breach,simple phishing attack,successful phishing attack","id":3639094},{"itemUrl":"/security/check-point-v-world-firewall-giant-stays-faithful-engineering-roots-3638930/","headline":"Check Point v the world – firewall giant stays faithful to engineering roots","metaKeywords":"Check Point&rsquo,Check Point,security firm,largest dedicated security,pugnacious techie founder,CEO Gil Shwed,never-ending hype cycle,security firm Lacoon","id":3638930},{"itemUrl":"/security/dropbox-for-business-security-explained-is-it-enterprise-ready-3638657/","headline":"Dropbox for Business security explained: is it enterprise ready?","metaKeywords":"Dropbox,Dropbox Business,Dropbox Enterprise,Dropbox Business. ,Dropbox Business/Enterprise offer,Dropbox Business API,consumer file storage","id":3638657}]