The concept of ‘Big Data’ is not new and was generally used to discuss the vast […]
A breach. A data loss incident. An insider leak. A media report of client data loss. […]
The protection of personal information is an important aspect of anybody’s life. Most people have a […]
Security Information and Event Management (or Monitoring) has been a round for a while and was […]
Identity provisioning has evolved significantly over the last 8-10 years, with suite and point products providing […]
The ‘insider’ is the dude in the office. He (or she) probably works in IT and […]
Privileged Account Management is a major concern to large organisations trying to control the ever growing […]
When you think of hacking or start looking at ethical hacking and counter measures, the focus […]
Defence in Depth. Rings of Security. Multi-layered protection. All well known terms when it comes to […]
A firewall. An aggressive connotation. A wall, made of bricks and cement, literally on fire. As […]