December 02, 2021

Pen-Test Me Later: Why Vulnerability Management is Your First Step

Vulnerability Assessments versus Penetration Testing

Read More
August 11, 2020

Introducing the Red Hat® Ansible® Automation Platform

We'd like to thank Red Hat® for this guest blog.

Read More
July 07, 2020

While the Healthcare Industry Focuses on COVID-19, Hackers Turn Relentless!

The past few months have played witness to a sharp rise in cybersecurity attacks against healthcare providers. Historically speaking, the healthcare industry has lagged behind other major industries

Read More
May 19, 2020

Cybersecurity Risks of Working from Home

Just as 2020 was getting underway, the entire world began entering various degrees of lockdown due to the spread of COVID-19. Social distancing was introduced as one of the key measures to slow down

Read More
February 27, 2020

Stay Secure: Protect Your Organization from Ransomware

Ransomware gangs are aware that the best use of their resources is to target corporate networks where they can gain access to many PCs and valuable institutional data. After all, a business is more

Read More
December 19, 2019

How to Improve on PCI Compliance Gaps

As we rapidly approach peak holiday shopping season, it’s time to assess your payment security procedures if you have not already done so. While Payment Card Industry Data Security Standard (PCI DSS)

Read More
December 05, 2019

Cybersecurity Statistics You Need to Know

The cybersecurity industry is rapidly developing. Even though a number of resources are deployed to mitigate cyber attacks each year, the industry still has a lot of catching up to do. Cybersecurity

Read More
November 14, 2019

Cyber Risk Governance Responsibility is Enterprise-Wide

No matter what industry you fall under, you will agree that data is the lifeblood of your business. Any physical or digital data pertaining to your business, employees, customers, contractors and

Read More
August 21, 2019

The Biggest Data Breaches of 2019 So Far

When it comes to data breaches, 2019 has already seen more than its fair share. Coming off the heels of a particularly bad year for major data breaches, everyone from medical companies to financial

Read More
August 15, 2019

What is Cloud Access Security Broker (CASB)?

The term cloud access security broker (CASB) was first coined in 2011, when the majority of IT applications were hosted in data centres and very few companies trusted their information to the cloud.

Read More
1 2 3 4 5
Content not found