Why digital transformation needs more flexible security testing
Whether it’s a global enterprise redefining a business process using cloud computing and machine learning or a sole trader setting up a social media presence…
Whether it’s a global enterprise redefining a business process using cloud computing and machine learning or a sole trader setting up a social media presence…
By Craig Burland, CISO, Inversion6 You’ve been laser focused on driving cybersecurity risk out of your organization and made great progress. Kudos, well done. But…
Jack Viljoen, Head of Prodinity Cyber Solutions, provides a cyber safety 101 to avoid vendor-related cyber-attacks. By Jack Viljoen, Prodinity Cyber Solutions The recent surge…
Unpacking the Complexities, Implications, and Future Outlook of the Cybersecurity Maturity Model Certification By David Brewer, Director of IT/Cybersecurity (Acting), Saalex Solutions, a division of…
The advent of Cloud providers in a big way impacts the way we are developing new applications since in most cases these new applications will…
By Mark Marron, CEO and President, ePlus, Inc. Organizations are increasingly advancing their digital transformation efforts to deliver internal efficiencies, reduce costs, and improve customer…
By Jhilam Biswas, Customer Engineering Manager, Google Cloud The growth of cloud computing is undeniable. According to Garter’s report, the global spending on public cloud…
Zero-trust architecture is becoming popular because it is a more comprehensive cybersecurity framework than previous castle-and-moat models. Increasing internal threat actors and social engineering call…
By Sudeep Padiyar, Senior Director, Product Management at Traceable AI When Data Loss Prevention (DLP) was conceived as a security concept in the early 2000s,…
ETSI’s annual flagship event on Cyber Security, the ETSI Security Conference, took place face-to-face from 16 to 19 October 2023, in ETSI, Sophia Antipolis, France, and gathered more than 200 people. This year the…
How to protect business against BEC-attacks By Sergio Bertoni, The senior analyst at SearchInform Attacks via email is one of the most beloved cybercriminals’ method…
By Nick Cadwgan, IP Networks at Nokia We find ourselves of in a world of accelerated broadband investment looking to address the global broadband divide,…