The year 2020 saw the California Consumer Privacy Act (CCPA) enforcement, a landmark law that provides the most comprehensive consumer data protection in the United States of America. Its effects…
-
-
In our increasingly global and interconnected world, businesses’ workforces and networks become more mobile and diverse every day. Whereas outsourcing various tasks related to management and security was seldom seen…
-
Canada’s PIPEDA vs. EU’s GDPR: what are they, and why should companies heed then? Simply put, they are in place to protect consumers’ privacy. The laws are so similar that…
-
A security operation center (SOC) is a centralized information security management team charged with managing intensive security operations for another organization. They’re responsible for externally monitoring, analyzing, and mitigating threats…
-
Modern day IT ecosystems are complex. Vast swaths of data need to seamlessly move throughout the networks’ applications, databases, and servers in a fast and secure manner. That data—especially the…
-
It has been quoted by the Department of Defence (DoD) that cybercrime cost the economy $600 billion in 2016. Amongst the economic costs to the economy, there are also opportunity…
-
The escalating threat of hackers grows more serious each day. A TechRepublic survey of more than 400 IT security professionals found that 71% of them had seen an increase in…
-
There’s been a paradigm shift over the past decade and a half in the world of cybersecurity. Whereas older models and systems prioritized perimeter defense, the definition of “perimeter” itself…
-
Identity and access management (IAM) best practices seek to clearly define, and oversee the access privileges granted to network users, and ensure that access is only granted to those within…
-
One of the measures that organizations have undertaken in recent years to ensure the integrity of their information networks is to undergo a procedure called an external penetration testing. …