News

Our latest Blogs/News

11 Apr How to recognize common phishing attacks

"Phishing scams are as old as the internet. Some of them are obvious because they come with a deal that is too good to be...

Read More

08 Apr 10 Git tips we can’t live without

"Git tips are a dime a dozen, and it's a good thing because you can never get enough of them. If you use Git every...

Read More

08 Apr Organizations underestimating the seriousness of insider threats

"New research, conducted by Forrester, found that 59% of incidents in EMEA organizations that negatively impacted sensitive data in the last 12 months was caused...

Read More

07 Apr The time is now: Edge datacentres come of age

"After years of hype and speculation, could the post-pandemic period see a resurgence in interest in the build-out of edge datacentres and compute environments as...

Read More

07 Apr 10 essential Linux tools for network and security pros

"Open source security frameworks help enterprises stay one step ahead of attackers by facilitating penetration testing and vulnerability assessments on wired and wireless networks." -...

Read More

06 Apr Developers do not view application security as a top priority, study finds

"While most would assume that developers are making cyber defenses a focal point, a new study has found that this may not be the case....

Read More