previous arrow
next arrow
Slider

Blog

By Connor Jones

If you’ve been keeping up with the headlines, you’d be forgiven for thinking the paramount concern with the security of 5G, the latest in hyperfast mobile networking technology, is the alleged threat Huawei poses to national infrastructure. But, if you speak to the experts, there are far more troubling concerns afoot. It’s not

By Lance Whitney

Biometrics are supposed to provide a more secure and easier way of protecting sensitive data. Using your fingerprint, your face, or your voice to sign into an account or retrieve personal information is considered a better and safer option than trying to juggle an array of passwords. Biometry-based authentication is

By  INDI SIRINIWASA

Regardless the state of digital transformation at an organisation, cybersecurity must always remain a corporate priority. But adding to the complexity of the ever-widening attack surface, is the increasing reliance on cloud computing and the Internet of Things (IoT), and the associated impact both these have on DevOps. With the

By Pankit Desai

There is enough coverage and statistics being bandied around in several media publications around the security threats that have been impacting the Indian enterprises. I don’t intend to bore the audience with one more piece around who and what of the cyber security attack pattern. The purpose of this article

By Ryan Davis 

Although a shared priority for both on-premise and cloud-focused teams, the conversation around how to secure critical assets in each environment can be quite different — beyond where data lives. A hybrid environment establishes a new landscape where responsibilities are split between cloud service providers (CSPs) and customers, and security

Locations

Get a Quote

If you have questions or comments, please use this form to reach us, and you will receive a response within one business day. Your can also call us directly at any of our global offices.