News
Our latest Blogs/News
10 Jun Unsecured databases bombarded by cyberattacks
"Security researchers often report finding unsecured databases online, waiting to be discovered and exploited. Sometimes, these databases remain unprotected for only a few hours, and...
09 Jun Security faux pas: 56% of employees use personal computers to WFH
"During this unexpected remote work era, more than half (56%) of employees reportedly use their personal computer as their work device, a Morphisec report found....
09 Jun Why traditional network perimeter security no longer protects
"Greek philosopher Heraclitus said that the only constant in life is change. This philosophy holds true for securing enterprise network resources. Network security has been...
08 Jun How data recovery software works
"Sudden data loss is a stressful situation for any business and can strike at the most inconvenient of times. Data loss on local drives has...
08 Jun What it takes to get DevSecOps right
"DevSecOps will drive at least 50% of new applications in Asia-Pacific by 2024, but getting it right will require change management, a collaborative mindset and...
05 Jun Ransomware operators are joining forces – here’s what you need to know
"Ransomware operators have joined forces and they are now exchanging tactics, intelligence and extorting victims through a shared data leak platform. Back in November, the...