Picture a heist. Picture that heist involving a hundred million people or more. Picture how that may look; imagine how that might sound. You’d be forgiven for imagining simultaneous full-scale bank robberies with alarms blaring and guns blazing, but this isn’t what heists look like anymore. Heists are silent. Heists hit millions, even billions, at one time from one remote location.
Read Article'The devil is in the detail' is a phrase which comes to mind when speaking about the GDPR (General Data Protection Regulation). The obvious topics surrounding the application of the regulation's articles have been extensively discussed, leaving behind those tricky and often overlooked details.
Read ArticleWhile it’s important to secure data no matter where it lives, data in motion is at its most vulnerable for hackers and needs to be a focus point for your security and compliance efforts.
Read ArticleSome time ago I read an article which suggested that humankind was fast reaching "peak knowledge". It explained that the depth of discovered knowledge meant the time required to specialise in a field had exceeded the lifetime of a human itself.
Read ArticleI know what you’re thinking…not another ransomware publication. It has certainly been the hottest IT security topic of summer 2016 and shows no signs of slowing.
Read Article