Information Security

Five security mistakes and how to prevent them

Sometimes it’s just a matter of changing your password more often. Security breaches have become distressingly common in recent years, compromising everything from employment records (security specialist RSA in 2011) to payment card information (Home Depot in 2014). And they’re becoming more complex and lethal, according to the recently released 2017 Verizon Data Breach Digest. […]

Five security mistakes and how to prevent them Read More »

Oracle HRMS and automation of identity provisioning

In most organizations, a primary responsibility of the Identity and Access Management group is to provision new users in Active Directory and Exchange, modify existing users, and terminate users in (almost) real-time when employees leave the organization. What is a Human Resource Management System? Human Resources departments in modern enterprises commonly leverage Human Resource Management

Oracle HRMS and automation of identity provisioning Read More »

Minority report: Pre-crime technology has arrived

Remember the movie Minority Report, where advanced analytics and supercomputing was able to predict where the next crime would take place and a special police unit was able to arrest murderers before they committed their crime? Well, that technology is not just for Hollywood anymore. Pre-crime technologies are already here The following pre-crime technologies already

Minority report: Pre-crime technology has arrived Read More »

Discover the intersection of artificial intelligence and cyber security. Explore risks, opportunities, and strategies for safeguarding your organization.

Can artificial intelligence win the war in cyberspace?

Ensuring that artificial intelligence (AI) is ‘secure by design’ and established on solid foundations poses a significant challenge in the cybersecurity space. As AI becomes increasingly pervasive across various technological domains and is integrated into critical systems, the imperative of ensuring secure design and deployment becomes paramount. Neglecting this aspect can potentially expose individuals and

Can artificial intelligence win the war in cyberspace? Read More »

5 technological trends in data storage of 2023

The digital landscape is experiencing an unprecedented surge in data storage demands as we venture further into 2023. The sheer volume of data being generated and stored is expanding at an exponential rate, challenging businesses to adapt and innovate in the realm of digital storage. How we access and retrieve data are evolving rapidly, necessitating

5 technological trends in data storage of 2023 Read More »

4 Tips to Stay Secure This Holiday Season

As we travel and spend time with family and friends,  people around the world are gearing up for festive celebrations, gift exchanges, and quality time with loved ones. Unfortunately, amidst the joy and merriment, there is an increased risk of security threats, both online and offline. Cybercriminals take advantage of the festive season to exploit

4 Tips to Stay Secure This Holiday Season Read More »

Enhance your infosec through end-user training

Your organization’s security is only as strong as its weakest link: your end-users. Therefore, it is imperative to prioritize end-user training at the organization level. A striking example of the consequences of overlooking employee training emerged in May 2022 when Yahoo’s senior research scientist, Qian Sang, gained unauthorized access to confidential information related to Yahoo’s

Enhance your infosec through end-user training Read More »

Your future is secured when your business can use, maintain, and improve its technology

Request a free consultation