News
Our latest Blogs/News
11 Apr How to recognize common phishing attacks
"Phishing scams are as old as the internet. Some of them are obvious because they come with a deal that is too good to be...
08 Apr 10 Git tips we can’t live without
"Git tips are a dime a dozen, and it's a good thing because you can never get enough of them. If you use Git every...
08 Apr Organizations underestimating the seriousness of insider threats
"New research, conducted by Forrester, found that 59% of incidents in EMEA organizations that negatively impacted sensitive data in the last 12 months was caused...
07 Apr The time is now: Edge datacentres come of age
"After years of hype and speculation, could the post-pandemic period see a resurgence in interest in the build-out of edge datacentres and compute environments as...
07 Apr 10 essential Linux tools for network and security pros
"Open source security frameworks help enterprises stay one step ahead of attackers by facilitating penetration testing and vulnerability assessments on wired and wireless networks." -...
06 Apr Developers do not view application security as a top priority, study finds
"While most would assume that developers are making cyber defenses a focal point, a new study has found that this may not be the case....