Introducing Zero-Trust Access

Introducing Zero-Trust Access

Introducing Zero-Trust Access   Working remotely has been a reality for many knowledge workers for many years, enabled by the growth and development of the Internet, Wi-Fi connectivity, and mobile computing devices. Indeed, it was this trend that powered the...
The Risky Business Gamble of AI

The Risky Business Gamble of AI

The Risky Business Gamble of AI The worldwide pandemic of Covid-19 has increased the amount of traffic on all of the social networks.  With almost everyone at home, they have more time to comment and research and share stories and opinions.  This means that these...
White-Hat Investigations Unveil Security Issues but Often at their own Peril

White-Hat Investigations Unveil Security Issues but Often at their own Peril

White-Hat Investigations Unveil Security Issues but Often at their own Peril It is rare that any law can outpace technology or the tactics of cybercriminals.  Many times it takes them weeks to discover and solve physical crimes. Since many law enforcement officers are...
Several Android Apps from Google Play Store’s come with malicious track-ware

Several Android Apps from Google Play Store’s come with malicious track-ware

Several Android Apps from Google Play Store’s come with malicious track-ware We have known for quite a while that the Google play store is home to a huge number of malicious apps.  These can range from those that collect your information for marketers, to those who...
Malcare WordPress Security