The Fight to Attain Cyber Supremacy in Corporate Networks
In 2003, a self-replicating sentient programme was causing mass mayhem. It successfully overwrote core programmes within a global network and
Read moreIn 2003, a self-replicating sentient programme was causing mass mayhem. It successfully overwrote core programmes within a global network and
Read moreAn increasing number of “things” are being connected today, and we are heading towards a world where everything that benefits
Read moreAlongside advancements in information and communication network technologies, there are parallel, adversely impacting ‘advancements’ on evolving forms and styles of
Read moreThe current business environment is more focused on this quarter’s P&L than the possibility of next quarter’s cyber disaster. In
Read moreWe are at an inflection point in how users view mobile security. Firesheep and Stagefright are just the latest wake-up
Read moreYears ago, we have had incidents of bank robberies. And in the recent months, we still have incidents of bank
Read moreThere has been widespread discussion about connected vehicle security, enough material on this is available on the web. Attacks on
Read moreThe growing number, complexity, and diversity of network attacks as well as sophistication of modern malicious software and tools used
Read moreInformation hiding denotes the placement of secret information within innocent information, to hide the very existence of secret communication [4].
Read moreCreating the right culture and approach to employee engagement will dramatically change the desirability of a company’s profile, when it
Read more