The Cloud Security Alliance (CSA) has released a survey which discusses who should be taking responsibility for breaches in the cloud. It’s a good question. The advent of Hybrid IT, among other things, has done much to destroy our traditional notions of the perimeter, with its siloed networks and...
Read MoreThe General Data Protection Regulation (GDPR) came into force on 25 May 2018. In the months that followed, the regulators were quiet, but businesses would have been unwise to have been lured into a false sense of security. In fact, data breach notifications were being collected and enforcement...
Read MoreIt’s no secret that IT has evolved and, as a result, so has our approach to cybersecurity. For example, focus has shifted from a purely preventative strategy to one that seeks to reduce the time to detect and mitigate a security incident. However, one thing that hasn’t received a lot of...
Read MoreThe internet is disrupting industries and business models, fundamentally changing the way we live and work in the process. The cloud has also ignited a wave of disruption, which when considered in conjunction with the proliferation of mobile devices, has rendered traditional network and security...
Read MoreMarc Vanmaele, CEO of TrustBuilder explains how banks and financial organisations can best balance...
Read MoreIn today’s interconnected digital world, there are increasingly blurred lines between an...
Read MoreBusinesses the world over are facing ever increasing pressure to adapt and evolve their IT...
Read MoreTechnology is one of the few things in life we expect to just work. This is especially true when it...
Read MoreMalware authors have always been trying to update their software and evolve their techniques in...
Read MoreBecrypt has been in the disk encryption business for more than 15 years and have carried out...
Read MoreA new year is the time for lots of pledges of how things will be done differently: new targets to...
Read MoreOut of all the IT security risks we face, mobile devices are the hardest to defend from cyber...
Read More