Zero Trust Security
The Zero Trust Security Model was conceptualized in 2010 by John Kindervag, principal analyst at Forrester Research Inc. As he defines it, Zero Trust is an IT security model that requires strong authentication
The Zero Trust Security Model was conceptualized in 2010 by John Kindervag, principal analyst at Forrester Research Inc. As he defines it, Zero Trust is an IT security model that requires strong authentication
Insider threats pose a significant cyber security risk to all organisations. Learn more about the insider threat landscape and ways to detect and mitigate risk.
How and why organizations are moving from perimeter defense to data-centric security
A brief on how AI is compromising our right to privacy and ways to tackle it. Artificial Intelligence (AI) is high on the agenda across most domains due to these three attributes: scale, speed, and automation.
This blog provides an overview of various challenges and security guidelines for protecting data on the cloud. We have also enlisted some handy tips that are aimed at enhancing the data security and privacy protection for the cloud environment.
CCPA aims to introduce new rights for California residents – mandating businesses within scope to address their security and privacy frameworks or face related fines due to non-compliance.