In our previous edition of this newsletter, we had discussed how ZTNA (Zero Trust Network Access) can be used to whitelist applications…
As users continue to work from anywhere and IoT devices flood networks and operational environments, continuous verification of all users…
There has been a sharp rise in cyber-attacks ever since the coronavirus (COVID-19) pandemic and global business have been suffering…
A cyberattack can affect your business in many ways, depending on its nature, scope, and severity. According to the FBI’s…
Four (4) zero-day vulnerabilities in Microsoft Exchange Server are being actively exploited by Hafnium, which the State Department believes is…
Serverless computing is a misnomer. Computing is impossible without the presence of a machine. Just like a virus needs a host, code…
On November 28, 2020, the AWS outage took down a large portion of the internet and affected thousands of companies…
The terms Business Continuity (BC) and Disaster Recovery (DR) have often been used interchangeably. DR usually involves recovering data and software…
With phishing and spam emails on the rise, they not only pose cybersecurity threat to the recipient’s organization, but also…
In the month of April, we conducted a survey of people working remotely to learn about the challenges and opportunities…