Vindication for Cyber Attackers
Often we hear about computer viruses and hacks when they happen, but rarely do we know if the creators and perpetrators were identified or […]
Often we hear about computer viruses and hacks when they happen, but rarely do we know if the creators and perpetrators were identified or […]
The new European data privacy legislation has some worried that its stringency could kill off data-driven online services and limit innovations. This interesting topic came to us […]
When it comes to cybersecurity, organizations face a future in which it’s best to prepare for worst-case scenarios. Unfortunately, it’s often difficult to convince […]
Cloud monitoring is the process of evaluating, monitoring, and managing cloud-based services, applications, and infrastructure. The typical cloud monitoring service integrates with dozens of services […]
A number of massive consumer information leaks occurred over the past year. The data breach headlines of 2017 included many known giants in technology […]
There are no longer any surprises when it comes to the latest data breach announcements hitting the headlines. Is the commonality of this event […]
If the trends tell us anything, data breaches are all but inevitable at every company, no matter how small they may actually be. It […]
The General Data Protection Regulation (GDPR) is a regulation in European Union (EU) law on data protection and privacy for all individuals within the European Union and the European Economic Area (EEA). It also addresses […]
Artificial intelligence (AI) is not just for television drama or Hollywood special effects. It is not just limited to large technology organizations and it […]
A recent audit revealed more than one in five serverless applications have critical security vulnerabilities. Business World brought this information to our attention in their […]