One of the longest ongoing discussions in the history of computing is that having good security results in a negative impact on usability. I am here to show that this… [Continue Reading]
The Internet has brought great value to our lives. It lets us communicate across the globe in the blink of an eye using instant messaging. It gives us platforms, accessible… [Continue Reading]
SAP has become a highly targeted application for cybercriminals. In a report by Onapsis it was found that 95% of SAP installations could be compromised with data being stolen and… [Continue Reading]
We are witnessing an onslaught of attacks coming in from highly organized cybercriminals. It is so bad, in fact, that the situation was recently described by U.S. Secretary of State,… [Continue Reading]
Data is big, data is valuable and data is trouble. In 2014, the Breach Level Index recorded that over one billion records had been breached, an increase of 78% over… [Continue Reading]
Signing into anywhere on the Internet has become everyone’s bugbear. We all tear our hair out at the request for the creation of, yet another, username and password. Research has… [Continue Reading]
Since the advent of the Internet, cybersecurity has been handed new challenges due to the massively expanded accessibility and interconnectedness of the web. Where once security was considered to be… [Continue Reading]