Archive

Back to homepage
Software

Success is in the Scoping: Incorporating Penetration Testing into Your Cybersecurity Planning

If you’re considering incorporating penetration testing into your cybersecurity planning process, there are some key considerations to keep in mind when you’re figuring out exactly what’s ‘in scope’ — what

Industry Insights

What is the Evolving Role of Ethical Hackers in the New Age of Cybersecurity?

My colleague, Ryan Kh of Smart Data Collective has published a number of articles on the role of machine learning in cybersecurity. While he has emphasized the benefits of Big Data in protecting against

Identity Theft

Don’t go once more unto the breach: fix those policy configuration mistakes

Asher Benbenisty at AlgoSec examines four common security policy errors, and shows how organisations can avoid them.As security threats become more and more advanced, managing your network’s defences correctly has

Software

Safeguarding Your Corporate Environment from Social Engineering

Technology on a global scale is getting smarter by the day. Breaching systems, networks and devices is no longer a piece of cake as it used to be many years

Industry Insights

SMEs: Small in Business, But Get Big on Cybersecurity

Cyber insecurity is no longer just a buzzword, it has become a reality for Small and Medium Enterprises (SMEs). When cyber attacks came to the fore as a recognised threat

Industry Insights

How to Integrate Business Security Systems

When choosing a business security system, you don’t want to leave anything to chance. In addition to having a system that gives you the best protection, you need it to

Software

How to Use Multi-Factor Authentication When You Don’t Have Cell Phone Access

Many security-minded businesses use multi-factor authentication to verify customers’ identities. The most familiar method is to send customers a code by SMS text message, which the customer then enters on

Software

Passwordless Authentication is Finally on the Horizon

For years, we’ve been discussing the vulnerabilities of passwords and the need to ditch them for more robust and secure solutions. However as we leave 2018, we’ve still been hearing

Industry Insights

How to Integrate Business Security Systems

When choosing a business security system, you don’t want to leave anything to chance. In addition to having a system that gives you the best protection, you need it to