Bring Your Own Device – BYOD – Security Controls
Bring Your Own Device (BYOD) policies have become increasingly popular among organizations, as they offer employees flexibility and improved productivity...
Bring Your Own Device (BYOD) policies have become increasingly popular among organizations, as they offer employees flexibility and improved productivity...
Futuristic CyberSecurity solutions? Zero Trust Security ArchitectureArtificial Intelligence/Machine Learning-based SecurityQuantum CryptographyHomomorphic EncryptionCyber Deception TechnologyBlockchain-based Security SolutionsAutonomous Security Operations Center (ASOC)Passwordless...
The United Arab Emirates (UAE) has been rapidly growing as a hub for technology and innovation. As a result, it...
The Cost of Not Securing Your Privileged Users: Lessons Learned from LastPass Breach" LastPass, a password manager with 30 million users,...
You consider yourself a responsible person when it comes to taking care of your physical possessions. You’ve never left your wallet in...
Online is a little different for everyone How do you connect online these days? I’ll give you an example from my...
Your Cybersecurity Comic Relief CVE-2021-20322: Of all the words of mice and men, the saddest are, “it was DNS again.” ...
Relying on the kindness of strangers is not an ideal strategy for CISOs and CIOs. And yet that is the...
Threat Summary On November 17, 2021, The US Cybersecurity & Infrastructure Security Agency (CISA) pushed an Alert entitled “Iranian Government-Sponsored...
Threat Summary This month it was disclosed that a Microsoft vulnerability that allows for local privilege elevation, previously patched in...