The common image of a hacker is a hooded figure in a basement, perhaps with the infamous anonymous mask on.…
Browsing: Articles
Information Security Buzz articles cover the latest cybersecurity topics, featuring thought leadership from industry leaders and experts.
We have all seen the Evolution of Man image, where the ape develops slowly from a hunched figure on all…
A Security Operations Centre (SOC) is a centralised unit that deals specifically with security issues on behalf of companies, at both an organisational and…
March is Women’s History Month with this year’s theme being “choose to challenge.” From a cybersecurity perspective, the number of…
We’ve already seen our fair share of pandemic-driven fraud and cybercrime, but what can we expect as vaccine rollouts pick up…
Cyber-crimes are changing and businesses need to understand how to protect themselves from falling victim to online attacks. Cyber-criminals are…
DevOps is a set of tools and best practices utilized by organizations to deliver software applications projects faster than traditional…
In the current crisis, secure remote access into the corporate network helps businesses configure systems, automate day-to-day operations, and ensure…
Shall we start from these observations? – No safe and orderly societal life would exist without solid identity assurance. No…
After a year full of unknowns and new normals, knowledge is power. The spike in cyber breaches in the past…