News
Our latest Blogs/News
18 Nov The six most common threats against the device that knows you best
"What is the most intimate relationship in your life—aside from your partner, your children or your parents? For many of us, it’s our mobile phone....
17 Nov Businesses are prioritizing security investment over emerging technologies
"British businesses are prioritizing technologies that help them stay secure over new and emerging technologies, a new Dell Technologies study suggests. The tech giant commissioned...
17 Nov How I use data to connect with my open source project’s contributors
"Data can help identify a project's stakeholders, enabling the project to make connections with the people behind the numbers." - read at OpenSource.com!
16 Nov We need a Cyber Awareness Century
"For a generation of people that panic if they leave home without their phone or in the event of a social media outage, we are...
16 Nov Many businesses forced to compromise security to focus on other goals
"An overwhelming majority (90%) of IT decision makers claim their business would be willing to compromise on cybersecurity in favor of digital transformation, productivity, or...
15 Nov How to optimise cloud spend for success and flexibility
"Cloud computing has underpinned the world’s remote workforces and critical supply chains as government’s and organisations continue to try to avoid economic disaster during the...