Legislation to protect the nation’s electric grid against cyber attacks was added to the final version of the National Defense…
Browsing: Strategy and Planning
To anyone unfamiliar with the term, ‘sandboxing’ might sound like something that toddlers would like to do at nursery school…
Public sector organisations in the UK are in the midst of changing cyber security regulations. In mid-2018, the Government, in…
Creator of The World Wide Web Tim Berners-Lee has proposed “The Contract for The Web” – a new framework to protect online…
The amazing community at MITRE recently published their list of the CWE Top 25 Most Dangerous Software Errors affecting the…
The academic and industry literature is full of extremely useful research, insights and advice on how people interface with security…
Implementing cybersecurity can be a lot like the cluttered homes Marie Kondo has turned from messy to ones that inspire…
Cloud-based network security solutions are becoming increasingly prevalent, and it’s not difficult to understand why when the two worlds responsible…
Why the reluctance in adopting MFA? The sad reality is that organizations that don’t use multi-factor authentication (MFA) are open…
We are all too familiar with the phrase “time is money” – and yet, with today’s technology and advancements, when a multitude…