20 years ago we approached IT and security quite differently compared to how it is done (or should be done) today. Most organisations had their data centres onsite, housing servers […]
The Mirai botnet has been the cause of many notorious DDoS attacks of late, denying access to popular services including Facebook, Amazon, Twitter and Netflix to name a few. The […]
Since the last data protection directive (EU) of 1995, the way in which data is processed has evolved drastically. Up until more recently individual’s rights have not been at the […]
Although ransomware has been established for a very long time: recently people have been made more conscious of ransomware and are more knowledgeable of what it is, including its regular […]
This article looks at addressing web security vulnerabilities.
The IoT is happening all around us. One such notable elaboration in this area is drones. Drones, also referred to as unmanned aircraft systems, are quickly finding their way into […]
In this, Part 8 and the last installment of our series, we will continue the application data protection story as we delve a little deeper into the challenges inherent in […]