Cyber Security Challenges
July 2016 - Do you need a wake-up call? A question often asked when you are travelling and forced to stay in a...
July 2016 - Consumers are becoming increasingly savvy and aware of the sensitivity of their data, underscored by numerous high profile data breaches...
July 2016 - The story of Pokémon Go makes an excellent case for the current reality in IT: we are living in a...
July 2016 - This article provides a review of the key trends and changes in the cyber crime landscape, recognizing that cyber criminals...
July 2016 - When moving to the cloud, enterprises need to manage multiple cloud services that can vary significantly from one to another....
July 2016 - Interview by Jeroen de Wit Nowadays, one of the most booming topics in the cybersecurity market is Cyber Threat Intelligence....
July 2016 - To know when it will start raining, we check the weather app. To find out if there are any traffic...
July 2016 - With the recent changes in rules and regulations, and academics stating that privacy is confusing, it is not a surprise...
July 2016 - An organization’s board does not only have a key responsibility for securing information assets, but they are in the best...
July 2016 - With the fast increase of cyber crime, companies are regularly being compromised by hackers. In many cases this is to...
July 2016 - SAP is an attractive target for cyber attacks for both malicious insiders and external actors, aiming to attack critical business...
July 2016 - Software as a Service (SaaS) solutions have been around for years and organizations are starting to move on a larger...
July 2016 - Awareness. You must have stumbled across this word hundreds of times when reading about the issue of cyber security. The...