Oct 22, 2015
Today the true power of the computer comes from being connected, and with more devices connected, so power grows exponentially. We see this today with cloud computing and increasingly with the Internet of Everything (IoE), which is creating unprecedented opportunities...
Oct 15, 2015
While some companies can be pretty strict about their cyber security policies, and risk that at the end of the day this might be counterproductive, others apply more flexible approach. The problem with being too rigid is that it could be like trying to control the...
Oct 6, 2015
Parenting, as we know it, is evolving in this modern, digital age. Mothers and fathers have traditionally warned their children of the physical dangers, be they pickpockets on the street or strangers in the park. Today, however parents are facing an altogether...
Sep 28, 2015
Most breaches and attacks do not happen quickly and violently. They happen stealthily over time, with threat actors lurking inside your network for months at a time, performing reconnaissance and looking for your most valuable and sensitive information. “In fact, the...
Sep 25, 2015
With the proliferation of mobile devices in the workplace, it has become critical to not only manage your mobile assets, but also protect your company’s data. The purpose of enabling a mobile workforce is to increase employee productivity and improve customer service,...
Sep 22, 2015
Ask any technical department what their major challenges are concerning cyber security, and it is almost guaranteed that many of them say their number one bugbear is changing the security culture of their organisation. Too often, says Jayson O’Reilly, director of...