previous arrow
next arrow
Slider

Blog

By  INDI SIRINIWASA

Regardless the state of digital transformation at an organisation, cybersecurity must always remain a corporate priority. But adding to the complexity of the ever-widening attack surface, is the increasing reliance on cloud computing and the Internet of Things (IoT), and the associated impact both these have on DevOps. With the

By Pankit Desai

There is enough coverage and statistics being bandied around in several media publications around the security threats that have been impacting the Indian enterprises. I don’t intend to bore the audience with one more piece around who and what of the cyber security attack pattern. The purpose of this article

By Ryan Davis 

Although a shared priority for both on-premise and cloud-focused teams, the conversation around how to secure critical assets in each environment can be quite different — beyond where data lives. A hybrid environment establishes a new landscape where responsibilities are split between cloud service providers (CSPs) and customers, and security

By Pascal Geenens

The close of one year and the arrival of another always calls for some reflection and predictions. While antivirus software developers and endpoint security researchers are always looking ahead, it’s often related to the micro challenges – the threats that companies face now – the known knowns. The cyber threats

By Danny Pehar

As a cybersecurity professional, I often preach to people about how the best way to prepare yourself to prevent, detect, and respond to cybercrime is to stay aware of cybersecurity best practices and to keep your eyes open for cyber scammers and deception. That being said, how do you avoid

Locations

Get a Quote

If you have questions or comments, please use this form to reach us, and you will receive a response within one business day. Your can also call us directly at any of our global offices.