Dennis NgoiMay 114 minThe Future of Cloud Security.Cloud computing has been on the rise in the recent past as more companies and enterprises adopt cloud based solutions as opposed to...
-Apr 194 minENDPOINT AND DATA SECURITYIt is necessary to re-evaluate existing cybersecurity techniques regularly to ensure protection of company data due to increasing threats.
Nelson NzuiMar 154 minTHREAT INTELLIGENCEIn this blog we describe the cybersecurity threat Intelligence - gathering, standardizing and making sense of data from IT infrastructure.
Dennis NgoiJan 104 minIs your Data Safe? Is it Encrypted?Data Encryption in IT Security is the conversion of data from a readable format into a ciphered format. Once data is encrypted it is...
John MOct 23, 20213 minCloud Security - after the turbulence.Empowering, Transformation & Trust. Cloud enables innovation and empowers transformation. We describe its securing data and apps on-cloud.
John MOct 18, 20213 minEDR, MDR or XDR - Which is the right option?Corporate managers when dealing with IT risk caused by malwares, often ask, what is the cause of the problem in the first place? How do...
John MOct 18, 20213 minZero Trust Network AccessZero Trust Network Access is a data protection model which applies the “never trust, always verify” model to grant access to corporate...