Today’s organisations realise that data is a critical enterprise asset, so protecting that data and the applications that hold it makes good business sense. However, different types of information have different protection and privacy requirements. Therefore, organisations must take a holistic...
Read More
Weak passwords have plagued businesses and security parameters for generations. People tend to set passwords that are easy for them to remember without considering how a weak password will impact the security of their data. This translates to corporate environments where employees tend to use...
Read More
Cybercrime is no longer monopolised by elite criminals and no longer consigned to the dark web alone. Recent investigations indicate that hackers have become much braver and are now operating in the open, using popular apps to conduct illegal dealings. Criminals are now using consumer applications...
Read More
Identity theft has become a major problem. It has steadily escalated globally as the need for digital identities continues to rise. In the UK, it was reported that 174,523 cases of fraudulent activity were identity fraud, with 95% involving the impersonation of someone else, and eight out of ten...
Read More
The IT security landscape has changed over the last few years. Historically organisations focused...
Read More
Digital transformation has changed the face of business, driving disruptive change and creating...
Read More
When the General Data Protection Regulation (GDPR) came into effect in May 2018, businesses from...
Read More
Beth Hood is a former advisor to the government on protective security. She now runs Verosa – a...
Read More
When budgets shrink, spending scrutiny grows — every penny is expected to fuel the highest...
Read More
The Cloud Security Alliance (CSA) has released a survey which discusses who should be taking...
Read More
As organizations digitally transform, critical systems and sensitive information can be accessed by...
Read More
Enterprises are increasingly recognising the benefits of embracing a cloud infrastructure to...
Read More