Digital Transformation on its peak
Anticipating a Post-Pandemic World What’s clear in the pandemic world is that digital transformation can happen fast. Strategic use of the cloud is the catalyst for operational changes and…
Anticipating a Post-Pandemic World What’s clear in the pandemic world is that digital transformation can happen fast. Strategic use of the cloud is the catalyst for operational changes and…
Detecting identity fraud It’s an easy step to forget, but always remember to keep your personal information safe and secure. Here are some useful tips to help you identify email…
In cybersecurity, there is no one-size-fits-all solution. When it comes to identity and access management, the set of practices, policies and procedures that an organisation decides to put in place,…
Bodybuilding.com data breach impacted over 7 million people worldwide. Bodybuilding.com, the internet's biggest online store and online forum for fitness and bodybuilding enthusiasts, has disclosed last week a security breach…
A security lapse at Canada’s fourth largest cell network, Freedom Mobile, exposed customer data.Security researchers Noam Rotem and Ran Locar found an Elasticsearch server leaking five million logs containing customer…
Microsoft discovered that a support agent’s credentials were compromised for its web mail service, allowing unauthorized access to some accounts between January 1st and March 28th, 2019. Software giant says the hackers could have viewed account email addresses, folder names, and subject lines of emails, but not the content of emails or attachments.
On March 30, on his own blog as well as in the pages of the Washington Post, Facebook Founder and CEO Mark Zuckerberg did indeed throw his support to porting a…
For startups, 2009 was a good year. More than 20 companies launched at that time, including Uber, Slack, Pinterest, and Blue Apron, eventually achieved $1 billion-plus valuations. Given that those…