By Roland Atoui

IoT devices aim to make our lives easier, more enjoyable and give us unprecedented control over many functions and aspects of our home right in the palm of our hands. Virtually any electronic device can be connected from TVs, security cameras, smart locks, smart thermostats, and the list goes on.

By Lior Cohen

When it comes to securing cloud environments, organisations have lots of options. The marketplaces provided by cloud vendors are filled with a wide array of security solutions. Many are from vendors who also build a broad set of security products spanning cloud and on-premises environments,

By Lior Cohen

Few organizations approach cloud infrastructure expansion strategically. Instead, cloud adoption and expansion tend to be ad hoc in nature. As organizations become increasingly reliant on cloud-based services and infrastructures, and as their cloud footprints expand, they often end up with a heterogeneous set of technologies with isolated security controls deployed in each of their cloud environments.

By Mutaher Khan

With the world moving online at an unprecedented pace, there is a heightening vulnerability when it comes to cybersecurity. Just in the past few months alone, we have seen a ransomware attack against K-Electric and data breaches at Bykea and Swvl.