Embracing automation to level the cyber security playing field
Organisations spend millions to be protected against cyber attacks. But how? Automation could be part of the answer – read why in our latest feature.
Read MoreOrganisations spend millions to be protected against cyber attacks. But how? Automation could be part of the answer – read why in our latest feature.
Read MoreAuthorities do have a legitimate need for access to communication and electronic devices. But a blanket master key to the encryption is a massive threat to our individual privacy and security. Read the comment from Tom Madsen and his Colleague Anders Hoegh Olesen on the encryption backdoor planned by the EU.
Read MoreThe security concerns of the 2020 election brought digital security to the forefront of the Western world’s attention and the buzz phrase “zero trust” went from tech company lip service to an actual technology feature. And for good reason. The biggest problem in digital security is not technological but human. People just didn’t want to make the effort to keep their data secure.
Read More2020 is a year that nobody could have predicted, and one that few will forget. Looking ahead to 2021, we will undoubtedly be presented with new challenges and evolving threats. 7 cybersecurity experts on what we can expect next year.
Read MoreCybersecurity audits do not deserve a bad reputation. But this attitude misses the point: a cybersecurity audit can be a multimillion-dollar blessing in disguise.
Read MoreEmotet is one of the most dangerous and persistent cyberthreats currently in the wild. Why that is and how to stop it explains Shimon Oren in his excellent article.
Read MoreDoes cybersecurity vendors offer too many tools for their customers, with too many features customers won’t use anyway, increasing complexity and risk to the environment they set out to protect? A question to think about – what are your thoughts? Talk back and let us know!
Read MoreThe vast majority of Black Friday’s activity this year will come online, and if the security precedent of 2020 is anything to go by, we can also expect malicious cyber activity to accompany it. Read insights of 6 security experts on the worlds biggest shopping event.
Read MoreInformation on social platforms and other public online databases should be exploited in digital forensic investigations that requires online public sources. How? Read our final installment of the OSINT series.
Read MoreInternal audit plays an extremely critical role in helping organizations in the existing battle of managing and overcoming cyber threats,
Read More