5 min read The growing threat of cyber adversaries loomed over organizations throughout 2021, and it shows no signs of slowing down as we enter March 2022. As teams continue […]
Information Technology
Looking Back to Look Ahead: Anticipating the Cybersecurity Landscape in 2022 – Rick Grinnell
4 min read From a CISO’s point of view, 2021 was not a very good year. It started with a scramble to address the SolarWinds cyberattack and is ending with […]
Four Mobile Cybersecurity Threats to Watch in 2022 – Justin Lie
3 min read Mobiles have become an extension of our arms. We use them for anything, and everything — from checking our heart rate to making sure a photo frame […]
3 Steps to Better Data Center Risk Management – Dipti Parmar
5 min read Data centers remain critical in the modern enterprise. Here’s what you can do to identify and mitigate risks in data center operations. Half a decade ago, in […]
The Need for Cybersecurity: Introduction and Importance of Cybersecurity – Sonali Pandey
4 min read Cybersecurity is important because it covers everything related to the protection of our sensitive data, personally identifiable information (PII), protected health information ( PHI), personal information, intellectual property, […]
The Connection Between National Security and Communication – Morolake Dairo
24 min read Abstract The concept of national security is all-encompassing and pervades all areas of national existence but it seems it has been limited to concepts bordering on military […]
The 5 Layers of Effective Endpoint Security – Andrew Young
3 min read Cybercriminals are mounting attacks against remote workforces at increasing rates. Here’s why a Zero Trust approach to endpoint security is the answer. Endpoints have become the preferred […]
What Are The Highlights Of Threat Management? – Hande Arici
2 min read Threat Management is a lifesaver. It helps before anything happens. What Is Threat Management? Security is a major concern for most companies and the Cyber Threat Management […]
5 Ways of Mitigating Open Source Security Vulnerabilities – Irhose Apori
1 min read Virtually every application across all industries has open source components and libraries as its foundation. This makes it crucial for everyone involved in the process of developing […]
Cybersecurity: What I know that you should too – Irhose Apori
4 min read Our Take: Cybersecurity should not be left in the hands of professionals alone. As the world increasingly becomes digital, it is important for each and every citizen […]