There are, by some calculations, no less than 11 different types of tools used today by a majority of corporations in efforts to remain secure. On top of the now ubiquitous patch management processes, log management systems, security configuration management (SCM), and security information and… Read More »Augmented Security Operations
Zero Trust Networking is the latest buzz in the Cyber Security world over the last few months and many organisations have called out that they are going to be following this directive. What is Zero Trust? Zero Trust Networking is a architectural foundation that is… Read More »Zero Trust Network
Businesses are scrambling to set up their IT environments for working from home. There are a few different varieties that businesses are choosing, they are: Applications in Cloud Connectivity via VPN to corporate network Access via Virtual Desktop (VDI) Each one of these options has… Read More »Working from Home – The NEW normal
About 12 months ago IBM released their Cloud Pak offerings to the marketplace as part of the first strategic direction in the move away from the traditional Perpetual licensing model. Whilst I think this was a few years late, its good to see that they… Read More »Cloud Pak for Security – Is it worth it?
Businesses must be online today. Consumers and businesses need to be able to interact with your business quickly and efficiently… no one has the time to fill out the cheque book anymore. When you allow users to do business with you online, you expose your… Read More »Threat Intelligence – Worth and Use
Many years ago, I had the great pleasure of working with John De Haven. John passed away some years back, but his words of wisdom remain with me. John was officially a genius. A member of Mensa, he had experience in real life or death programming while… Read More »The day will come and mantras to live by.
Trends in world criminal activity indicate that cybercrime is increasing proportionally compared to other types of crime. This makes sense. As smart criminals look for new ways to foil authorities, they shy away from more traditional crimes and move to the greener pastures of cybercrime.… Read More »Synthetic ID’s, AI Hacks, and Prosthetic Attacks – Criminal Innovation
Complexity for Simple information In the complex modern world of ICT, there is nothing that is more important to your business than the data that resides within it, whether it be a person’s name, date of birth or even their credit card details. The database… Read More »Database Security – Complexity for Simple information
Software Defined Networking (SDN) has become the rage in the last few years. It has been seen as a revolution of the way to deliver multiple services without having multiple servers and huge datacentres. Whilst it is a great thing for ICT to be able… Read More »Application Scanning – Constant Scanning for Security Concerns