IoT security

A Closer Look at IoT Security Solutions

IoT security looms large as more companies embrace transformational technologies Companies looking to get the most out of their mobile solutions typically employ the help of app developers, who can help in ...
Security Boulevard
Thirty-four Years - Networking and Software Development (Part 2)

Thirty-four Years – Networking and Software Development (Part 2)

| | career, software
At the college we were extremely fortunate to have a president who had a very forward looking view of technology. In the mid 1980s he was already using personal computers regularly and ...
Why does GDPR Matter in the Tech and Media Industry?

Why does GDPR Matter in the Tech and Media Industry?

Robust have never been so high-profile. The introduction of the EU GDPR (General Data Protection Regulation) in May 2018 put personal data protection firmly in the public consciousness. Cybercrime continues to grab ...

Is ISO 27001 accreditation worth it?

Have you ever wondered whether your organisation should become certified to ISO 27001? ISO 27001 provides the specification for an effective ISMS (information security management system) – a framework that offers a ...

Banking – Building trust in an age of disruption

Digital disruption has long made its presence felt in the retail banking sector. A series of challenger brands have launched in recent years, building innovative and intuitive digital interfaces from the ground ...
Resolving the Rift Between Development and Security

DevOps and SecOps: Resolving the Rift Between Development and Security

Helping DevOps and SecOps teams work together in harmony for better security Developing a new application or services can be an exciting, energizing task for a business. We get caught up in ...
Security Boulevard

Every organisation is affected by cyber risk!

Organisations that believe they can ignore cyber risk management and the benefits it offers will probably lose out as others adopt more efficient, more economical, less human-resource-intensive solutions. For effective cyber risk ...

Myth-busting: Why risk assessments shouldn’t be a one-time thing

We’re kicking off a new series of blogs tackling some of the biggest misconceptions around risk assessments, information security, data protection, regulatory compliance, and other issues that our customers are grappling with ...

The importance of information security

For many organisations, information is their most important asset, so protecting it is crucial. Information security is “the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of ...
Loading...