A pragmatic approach to disaster recovery

What will your business do in the face of a disaster? Does your business shave a disaster recovery plan? Is it up to date and has it been tested? Disaster recovery is an important part of your security strategy, as …
Read More

Securing the Internet of Things in the Enterprise

Digital transformation is driving the growth and adoption of Internet of Things (IoT) devices in the enterprise and the trend is accelerating at an unprecedented pace. IoT device growth is far outpacing the growth of more traditional computing devices such …
Read More

Cat amongst the pigeons: Insider Threat

In building your cyber security programme, you have likely focused on protecting your perimeter and keeping unknown threat actors from accessing your systems, networks and data. In doing so, have you ever considered what the people you trust are doing …
Read More

Securing employee internet traffic

Alternatively, how did Barbara in Finance just download malware on the network? As the leaves are turning brown and we are being asked, once again, to work from home where we can, we, as IT and cyber security professionals, are …
Read More

Development Security in Focus

With this article, we hope to highlight good practices in software and application development. In short, what you should take into consideration to be able to develop secure applications and software, however and wherever they will be distributed. We will …
Read More