<
>

Top 5 Features You Should Look for in an Enterprise File-Sharing Platform

  With the proliferation of data in today’s digital landscape, there is also a need for enterprises to enable employees, partners, or customers, to share files, documents, photos, and videos across multiple...

Contact Tracing Apps: Protect Your Life or Your Data?

Contract tracing is a practice that allows governments and health industries in many countries to keep track of individuals who may have had close contact with a COVID-19 positive patient. As manual contact tracing methods may...

Why You Have to Automate Your Security Operations

Securing your organisation from a plethora of cyber threats and vulnerabilities can be overwhelming, yet it is a critical task that all businesses must do. Not only that but businesses must also do it quickly and effectively, as...

Let’s Have a Candid Discussion on IoT and Internet Security

Authored by: Morey Haber, CTO & CISO at BeyondTrust If you are an IoT vendor, you have some fundamental responsibilities to protect your company, infrastructure, and the security and privacy of your clients. You would want...

Creating a New Generation of Cyber-Resilient Digital Citizens

Authored by: Dato’ Ts. Dr. Haji Amirudin Bin Abdul Wahab FASc As Malaysia forges ahead with digital transformation, significant changes are taking place in the way businesses operate and the way we live. Digital...

Protect Cloud Data Security with SD-WAN

Authored by: John Tait, Global Managing Director, TNS Payments Market   Imagine telling a business owner 50 years ago that, someday, their customer and business data would be stored on computers not owned or located in...

Reinforcing Data Protection in the Digital Age

Authored by: Dato’ Ts. Dr. Haji Amirudin Bin Abdul Wahab FASc In the near future, the world’s most valuable resource may no longer be oil but data. If harnessed and analysed, data can drive good decision-making...

WhatsApp Privacy Policy Update Delay Won't Stop The Exodus To Telegram and Signal and Here Is Why

An update published on WhatsApp's blog pages on the 15th of January announced they are delaying the privacy policy update that has caused millions of people to seek alternatives to their messaging platform. The blog starts...

The Three Core Pillars of Data Security

Your legacy cybersecurity approaches are probably failing now in securing your ever-growing data – and it is time to acknowledge it. Outdated approaches to data security may now be obsolete as we transition into a new...

Your Transition to Quantum-safe Security Has to Start Now!

“With Great Power Comes Great Responsibility" This line might be taken from a Spiderman movie, but it makes it no less true. Technology provides us with this "use of power moral dilemma" on a...