Protecting your company’s intellectual property
Data breaches are a regular feature in the news lately. More often than not, these news stories are concerned with the theft and exposure of customer information. But what [...]
How is your business’ IT security adapting to the ‘new normal’?
For years, organisations have been trying to get to grips with cyber security and figure out how they can protect their systems and network from a breach. Because the [...]
Application security development in the cloud
Application security describes protective measures taken at the application level to prevent data or code within the app from being stolen or hijacked. These measures can include both hardware and software, as well as [...]
IGA: better integration through advanced automation
The importance of Identity Governance and Administration (IGA) in managing and reducing user access risk is well documented. Yet, despite this, many organisations still rely at least partially on [...]
SCADA: keeping your system secure from cyber attacks
SCADA (Supervisory Control and Data Acquisition) is not a specific technology, but rather a type of application that receives operating data about a system to control and optimise it. [...]
IAM: safeguarding organisations against rising cyber threats
Organisations increasingly recognise Identity & Access Management (IAM) as a key enabler and an essential building block for achieving effective business transformation. But what exactly is it? IAM is [...]
Applying a zero-trust approach while working from home
By now, many companies have accepted that working from home and remote working are likely to become the new ‘normal’. But that doesn’t necessarily mean their network and systems [...]
IGA: managing and reducing user access risks
Understanding and being able to measure risk is the first step toward reducing it. For many organisations, the most significant internal risk comes from the vast number of sensitive [...]
Zero trust: enabling business continuity and security during a pandemic
From business owners and management staff to IT support and security teams, more people than ever are now working from home due to the coronavirus outbreak. As a result, [...]
The coronavirus threat: beware of increased cyber-attacks
Across the country, parents are juggling working from home and home-schooling. Equally, companies are facing the prospect of functioning with skeleton teams and limited resources, including important IT support functions. [...]
Highlights from the 2020 RSA Conference
Last month, we attended the RSA Conference in San Francisco — like we’ve done the past few years. Although this year was a little different... The trade show was expected [...]
Private property: no phishing
‘Phishing’ has been around for decades now. America Online (AOL) first flagged an algorithm-based phishing concept in the 1990s, which generated random credit card numbers to match with original cards [...]
How does cyber-crime affect our society?
Over the past decade, technology has advanced significantly to create the highly digital world we now live in. As a result of these developments, the conversations around cyber-crime (and, consequently, [...]
Mobile phones: the key to your company’s data
Thanks to today’s impressively powerful processing, mobile phones are being used in business more than ever before. Whether employees are working from company-issued phones or have been granted high-level access from personal [...]