.
HomeSecurity

Security

Not Going Down Without a Fight

As smart as humans are considered to be, we do have a tendency to...

A2-2 Whiz Kids and the Risk of Data Privacy &Cyber Attacks

The implementation of new forms of social media channels always gets accompanied by the...

Tightening the Security String

The idea of regulating people and organizations sounds highly complex from afar, and in...

Building a Robust National Cybersecurity Awareness Month Program

The month of October tends to generate a lot of buzz amongst the cybersecurity...

From Bad to Worse

We live in a world that is hugely interconnected. As a result of it,...

Opting for a Stricter Stance

Human’s ability to envision things grander than themselves has certainly done a lot to...

Governance, Risk and Compliance in the Age of Connected Things

The explosion of connected devices including Internet of Things (IoT), Internet of Medical Things...

Global Data Processing Agreements for Global Cybersecurity Providers and their Customers

A company's chain of cybersecurity measures is as strong as it weakest link. To...

Call for a Safer Digital World

Technology is rightfully applauded for all what it has done to transform the dynamics...

Governing the Modern Era

The idea of regulation and compliance might have had a controversial history, but to...

Hot Topics