23
May
Is Your Business Prepared for Cyber Attacks During National Crises?
0
Cyberattacks have become a favored weapon for state-sponsored actors in a world where geopolitical tensions escalate quickly. These cyberattacks can shatter critical infrastructure, disrupt economies,... Read More
19
Sep
Safeguarding your Organization from Internal Threats
Just a quick recap from my previous blog where we focused majorly on How crucial data is and what’s even more important is its security.... Read More
08
May
IT Needs To Change Security Policies
IT managers and information security will be unable to directly control or adequately protect company data in the coming years. The confluence of cloud hosting... Read More
09
Dec
Tips To Measure The Effectiveness Of Governance Identity
In the community of IT security initiatives, identity and access management (IAM) are considered to be of high value. But the processes, technologies and policies... Read More
14
May
Standards Of IT Security And The Providers Of The “Cloud”
Standards for IT Security – SAS 70, HIPAA, SOX and others – are important in the cloud, as in the autonomous systems working at... Read More