The boom of information technology opened an entirely new world of identities and opportunities. Most users’ journies in the cyber world started with the creation...
Latest Posts

The importance of baseline configuration management in a network
In a network environment, configurations are often considered of incalculable value because a small change in a device’s configuration can make or break the entire...
March 2023 Patch Tuesday comes with fixes for 83 vulnerabilities, including 2 zero days
The third Patch Tuesday of the season doesn’t fail to surprise us at all. Keeping the trend intact, March 2023’s Patch Tuesday lists fixes for...

Network traffic analysis: A brief report on significant network performance monitoring avenue
Most corporate IT landscapes have a variety of traffic types involved, like cloud, web, and video. With network endpoints interconnected, the performance and risk of...

Massive data breach with fake ChatGPT extension
Chat Generative Pre-trained Transformer (ChatGPT) is now available on the official Google Chrome store as a browser extension, giving you easy access to...

Oracle Database monitoring: An administrator’s guide
Oracle Database is known for its reliability, scalability, and outstanding performance. An enterprise-friendly feature catalogue makes it a go-to for companies that need data to be...

Five worthy reads: Hello from the dark side—the nefarious nature of voice AI technology
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we are exploring voice-activated...

World Backup Day: Why having a plan B is important for every organization
In today’s data-driven economy, data is the lifeblood of any business. A catastrophic data loss event can cause irreversible damage to an organization’s reputation, financial...

[Webinar] Singapore’s Zero Trust policy and what we can learn from it
In today’s world, cyber espionage and cyberwarfare, are becoming increasingly frequent. Contracted by nation-states, threat actors attack rival nations to destabilize their government, economy, or...