An eighties classic – Zero Trust

A deep-dive in Zero-trust, to help you navigate in a zero-trust world and further secure your…

soft copy

What is a soft copy? A soft copy (sometimes spelled “softcopy”) is an electronic copy (or…

Cisco averts cyber disaster after successful phishing attack

Cisco has revealed that it has fought off a potentially damaging cyber incident that unfolded after…

x and y coordinates

What are x and y coordinates? X and y coordinates are, respectively, the horizontal and vertical…

electron

What is an electron? An electron is a negatively charged subatomic particle that can be either…

GitHub targets vulnerable open source components

GitHub has introduced an automated alert mechanism to enable developers to address vulnerabilities in the open…

How to check if your PC has been hacked, and what to do next

Has your PC been hacked? Whatever happens, don’t panic. Read on for ten signs your PC…

Is cloud computing immune from economic downturns?

A recent piece in Silicon Angle by Paul Gillin said out loud what I see firsthand:…

data catalog

What is a data catalog? A data catalog is a software application that creates an inventory…

Cyber insurance getting harder to obtain

The number of organisations that will either be unable to afford cyber insurance, end up with…

Translate »