How can businesses keep the channel secure in an age of out of control cyber threats? Learn more about vendor risk management and cyber security.
One of the best ways to understand any given concept is to classify it. Classification is used across many disciplines, from biology to data science. Being able to group ideas,… [Continue Reading]
The IT industry is famous for constantly inventing new buzzwords. Sometimes, they describe new technologies and sometimes, they are just there to show well known technologies in a new context…. [Continue Reading]
By 2014 there were more mobile devices than people in the world. Looking at the GSMA device tracker today, shows a world filled with almost 8 billion devices, and nearly… [Continue Reading]
In late 2014 a major bank cyber heist was spotted. This has become known as the infamous ‘Carbanak’ attack and may have resulted in over $1 billion being stolen from… [Continue Reading]
The last 20 years, the mass uptake of the Internet has significantly changed the way we communicate, work and play. It sometimes feels like our whole lives are digitized, we’ve… [Continue Reading]
The way in which technology has invaded our lives can sometimes feel overwhelming. We now carry our own small mobile computers in our pockets and bags with us everywhere –… [Continue Reading]
The cybercriminal is a trickster. They like to find new and novel ways of infecting our computers, to stay one step ahead of the game at all times. The Internet… [Continue Reading]
Security is something that all of us, from C-level down are now fully aware of. This is at least in part due to the onslaught of cyber attacks over the… [Continue Reading]
When the Internet arrived we entered a new era of cyber security. The threat landscape went from one where we could manage it within the walls of the enterprise, to… [Continue Reading]
Introduction to the world of Online Identity Identity is our very essence, it is our being and it is how we communicate with the world. The fact that we now… [Continue Reading]
Find out how modern, user-friendly yet safe online working and collaborative environments can be created for employees, customers and partners. Download our new White Paper suggesting the 10 Best Practices… [Continue Reading]
It’s pretty well established that the impact of cybercrime activity and the mitigation of this impact through security defense costs, has become a major business expense. In 2015, the cost… [Continue Reading]
The digitization of almost everything we do has become the norm. From our phone, to our TV and with the advent of the Internet of Things, even our fridge has… [Continue Reading]
There has been a change in the way that cybercrime is committed. In the early days of personal computing, back in the 1980s, malware threats like the infamous Brain virus,… [Continue Reading]
In the previous articles, we’ve discussed all of the security issues that face a modern enterprise. Security was always something that was a necessary evil, something that we had to… [Continue Reading]