
According to predictions made by Gartner, “hyper automation” will be the number one strategic technology… Read More


The social distancing measures introduced by Governments across the globe in an attempt to prevent… Read More


When discussing information security trends in the event of a recession, the problem is that… Read More


The need for enterprises to manage and maintain their own IT infrastructure is slowly, but… Read More


Normally, if an organization deployed a Data Security Platform with some sort of anomaly detection… Read More


Business Email Compromise (BEC), formally known as the “man-in-the-email” scam, is a type of cyber-attack… Read More
