security policy

The top 5 stories from across the global tech world!

From whistleblowers to dating tv, read our countdown of the top 5 stories from across the global tech world. Number 5- Snapchat goes 3D! If you can’t get enough of making selfies, then I have JUST the thing for you! Now with Snapchat upping its game, it has introduced a new camera mode that can […]

The top 5 stories from across the global tech world! Read More »

From whistleblowers to dating tv, read our countdown of the top 5 stories from across the global tech world. Number 5- Snapchat goes 3D! If you can’t get enough of making selfies, then I have JUST the thing for you! Now with Snapchat upping its game, it has introduced a new camera mode that can

BYOD: Useful or Unpredictable?

Nearly half of North American and European employees use their own devices for work. In developing nations (e.g. India), the rate is much higher. As external devices become integrated into the workplace, however, they bring cybersecurity vulnerabilities along with them, because every new computer in a network constitutes a new path for potential malicious attacks.

BYOD: Useful or Unpredictable? Read More »

Nearly half of North American and European employees use their own devices for work. In developing nations (e.g. India), the rate is much higher. As external devices become integrated into the workplace, however, they bring cybersecurity vulnerabilities along with them, because every new computer in a network constitutes a new path for potential malicious attacks.

Data breach at the border. Are your subcontractors an easy target?

It’s near-impossible to travel anywhere today without submitting to the most extensive of security checks. We know of the pat-downs, the metal detectors, the shoes off, the interviews at airports. Increasingly, biometric fingerprint and facial scans are being implemented to add “convenience” for travellers. Opting out can be prohibitively difficult. Sometimes there is no choice–if

Data breach at the border. Are your subcontractors an easy target? Read More »

It’s near-impossible to travel anywhere today without submitting to the most extensive of security checks. We know of the pat-downs, the metal detectors, the shoes off, the interviews at airports. Increasingly, biometric fingerprint and facial scans are being implemented to add “convenience” for travellers. Opting out can be prohibitively difficult. Sometimes there is no choice–if

Is FaceApp Misusing Your Data?

Last week, hundreds of millions of people uploaded pictures of themselves to FaceApp.  You, your friends, your parents, comedians, athletes, the Avengers. It was all fun, until Senator Chuck Schumer tweeted last week that FaceApp might constitute a national security threat.  His argument had very little to do with the app itself, and almost everything

Is FaceApp Misusing Your Data? Read More »

Last week, hundreds of millions of people uploaded pictures of themselves to FaceApp.  You, your friends, your parents, comedians, athletes, the Avengers. It was all fun, until Senator Chuck Schumer tweeted last week that FaceApp might constitute a national security threat.  His argument had very little to do with the app itself, and almost everything

Myth: Having a Password Vault will keep your data safe

On Black Friday, 2013, millions of shoppers went to Target stores around the U.S. They picked out what they wanted, stepped up to a cashier, swiped their credit cards and left happy. Except they shouldn’t have been happy. Months earlier, hackers broke into Target IT systems through a small, third-party HVAC contractor to the company.

Myth: Having a Password Vault will keep your data safe Read More »

On Black Friday, 2013, millions of shoppers went to Target stores around the U.S. They picked out what they wanted, stepped up to a cashier, swiped their credit cards and left happy. Except they shouldn’t have been happy. Months earlier, hackers broke into Target IT systems through a small, third-party HVAC contractor to the company.

Why Privileged Access Management is Important & Crucial for all Businesses

The number of reported instances of data breaches in different organizations increases with each passing day. Businesses are feeling the frustrations that follow such occurrences. In 2019 during the World Economic Forum, cyber attacks and data breaches ranked fourth and fifth respectively for two consecutive years as the globe’s most dangerous risks. A practical case

Why Privileged Access Management is Important & Crucial for all Businesses Read More »

The number of reported instances of data breaches in different organizations increases with each passing day. Businesses are feeling the frustrations that follow such occurrences. In 2019 during the World Economic Forum, cyber attacks and data breaches ranked fourth and fifth respectively for two consecutive years as the globe’s most dangerous risks. A practical case

DSS: PAM as the answer to fundamental PCI DSS requirements

What is The Payment Card Industry Data Security Standard (PCI DSS)? It’s a worldwide information security standard for all organizations that process credit cardholder information. Since Visa first rolled out its Cardholder Information Security Program (CISP) in 2001, organizations that manage cardholder data have been given detailed guidelines for securing their infrastructure and ultimately the

DSS: PAM as the answer to fundamental PCI DSS requirements Read More »

What is The Payment Card Industry Data Security Standard (PCI DSS)? It’s a worldwide information security standard for all organizations that process credit cardholder information. Since Visa first rolled out its Cardholder Information Security Program (CISP) in 2001, organizations that manage cardholder data have been given detailed guidelines for securing their infrastructure and ultimately the

Agent or Agentless approach?

Some say, that both agent and agentless approach in IT security has its own advantages and disadvantages. In general, agents as small pieces of software are often seen as efficient and reliable way of gathering lots of data from a system they are installed on while agentless approach relies on industry standards to provide information

Agent or Agentless approach? Read More »

Some say, that both agent and agentless approach in IT security has its own advantages and disadvantages. In general, agents as small pieces of software are often seen as efficient and reliable way of gathering lots of data from a system they are installed on while agentless approach relies on industry standards to provide information