T-Mobile, the Deutsche Telekom-owned mobile communications brand, has suffered a data breach that exposed the records of 37 million customers. Th...
Category: Cloud
Introduction to cyber security in 2022 Cyber security is central to operational success Cyber security practitioners entered 2022 under the shado...
State of cloud configuration security practices The use of the cloud is set to grow exponentially throughout 2022. The Cloud Configuration Securi...
Executive summary of CISO CISOs are under immense pressure to protect their organization and keep them out of the breach headlines. The largest o...
A brief introduction to cloud migration Cloud migration describes moving some or all of a company's IT resources, databases, applications, servic...
The data breaches LastPass suffered in August and November 2022 resulted in confidential customer information being compromised. In a statement, ...
This article explains what carding is, how hackers can gain access to payment details and the effects carding cyber attacks can have on businesse...
There is a thought-provoking CIS Controls document that discusses the application of the Pareto principle (80/20) to Information Security. CIS ex...
Password manager LastPass has continued to maintain the security of its customers’ passwords despite suffering its second data breach of 2022. Th...
To read this report in full in PDF format, click the ‘view report’ button The use of the cloud is set to grow exponentially throughout 2022. The ...