General | December 29, 2021Understanding Saudi Arabia's new Personal Data Protection LawThe processing of data is a long-standing debate among governments, businesses, and tech giants alike. Major corporations are identifying data...
IT Security | December 21, 2021New Log4j flaw: 5 reasons why organizations should worry nowThe world of cybersecurity has been constantly challenged since the pandemic started. With the dust still...
General | December 20, 2021Get the most out of kiosk devices while securing them using MDMThere's a good chance we all interact with kiosks just as much as we do with humans, and this was true even...
General | December 17, 2021Five worthy reads: Congratulations! You have just been socially engineeredFive worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and...
IT Security | December 15, 2021EventLog Analyzer year in review: 2021Our log management solution, EventLog Analyzer, has had yet another busy year. Being named...
Patch Manager Plus | December 15, 2021December 2021 Patch Tuesday: Fixes for 67 vulnerabilities, including 6 zero-daysThe last Patch Tuesday of this year is here, and it comes with fixes for 67...
AD360 | December 14, 2021The human element in cybersecurityAccording to IBM's Cost of a Data Breach Report 2021, the global average cost of a data...
AD360 | December 13, 2021Implementing endpoint and network security for a hybrid workforce modelThe onslaught of the COVID-19 pandemic brought about many changes and disruptions in...
AD360 | December 9, 2021Developing a risk-based approach to cybersecurity in the hybrid workforce modelThe hybrid workforce model is a novel workplace trend that provides employees the freedom...
AD360 | December 8, 2021Reinventing cybersecurity with a multi-layered approachThe complexity of cybersecurity threats has increased over the years. Additionally, the...