Email is not only the most popular form of communication for organizations, but it is also the most popular way…
Browsing: Strategy and Planning
Mobile application penetration testing is one of the most effective and efficient ways to find security vulnerabilities in your mobile…
APIs have delivered velocity and competitive advantage to companies of all sizes with IDC research calculating that 10-50% of enterprise revenue is…
Is Defence in Depth still relevant now that the concept of Zero Trust has taken hold? That was the question…
Bridging the Gap Between Current and Desired States Bridging the Gap Between the current and desired states, Security experts, auditors,…
While we may be going into a tough economic time for businesses, it’s also very important not to let your…
State-Sponsored Actor Targets Cert Authority, Government Agencies In Multiple Asian Countries A new state-sponsored actor has targeted multiple Cert Authorities…
When the world hit pause during the pandemic, home offices, remote work, and the adoption of cloud-based business applications created…
The UK’s National Cyber Security Centre (NCSC) has begun scanning all Internet-exposed devices hosted in the UK for vulnerabilities. As…
Every October is recognised as Cybersecurity Awareness Month, during which governments and the private sector collaborate to promote awareness about…