There has been a change in the way that cybercrime is committed. In the early days of personal computing, back in the 1980s, malware threats like the infamous Brain virus,… [Continue Reading]
Using Security Insights for a New Generation Approach to Enterprise Security
In the previous articles, we’ve discussed all of the security issues that face a modern enterprise. Security was always something that was a necessary evil, something that we had to… [Continue Reading]
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both
One of the longest ongoing discussions in the history of computing is that having good security results in a negative impact on usability. I am here to show that this… [Continue Reading]
Web Attacks and Their Consequence
The Internet has brought great value to our lives. It lets us communicate across the globe in the blink of an eye using instant messaging. It gives us platforms, accessible… [Continue Reading]
Aspects of SAP Portal Protection
SAP has become a highly targeted application for cybercriminals. In a report by Onapsis it was found that 95% of SAP installations could be compromised with data being stolen and… [Continue Reading]
The Importance of Consolidating your Infrastructure Security
We are witnessing an onslaught of attacks coming in from highly organized cybercriminals. It is so bad, in fact, that the situation was recently described by U.S. Secretary of State,… [Continue Reading]
What Cybercriminals Want: Company Data
Data is big, data is valuable and data is trouble. In 2014, the Breach Level Index recorded that over one billion records had been breached, an increase of 78% over… [Continue Reading]
One Login to Rule Them All: Cloud Single Sign On
Signing into anywhere on the Internet has become everyone’s bugbear. We all tear our hair out at the request for the creation of, yet another, username and password. Research has… [Continue Reading]
The Whys and Wherefores of Web Security
Since the advent of the Internet, cybersecurity has been handed new challenges due to the massively expanded accessibility and interconnectedness of the web. Where once security was considered to be… [Continue Reading]