PURPOSE When you evaluate cloud platforms, you need to compare features, costs, benefits, limitations and implementation details. TechRepublic P...
Category: Cloud
In this exclusive interview, fellow of cyber security and governance at Singapore University of Social Sciences, Anthony Lim, shares his insights...
In this exclusive interview Asia-Pacific-based cloud security architect and cyber security consultant Mayank Sharma shares key insights on cloud ...
In this article, Cyber Security Hub explores how cyber attackers use threat vectors like phishing, social engineering and ransomware to enact bus...
T-Mobile, the Deutsche Telekom-owned mobile communications brand, has suffered a data breach that exposed the records of 37 million customers. Th...
Introduction to cyber security in 2022 Cyber security is central to operational success Cyber security practitioners entered 2022 under the shado...
State of cloud configuration security practices The use of the cloud is set to grow exponentially throughout 2022. The Cloud Configuration Securi...
Executive summary of CISO CISOs are under immense pressure to protect their organization and keep them out of the breach headlines. The largest o...
A brief introduction to cloud migration Cloud migration describes moving some or all of a company's IT resources, databases, applications, servic...
The data breaches LastPass suffered in August and November 2022 resulted in confidential customer information being compromised. In a statement, ...