Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week, we take a...
Five worthy reads: Decentralized identity—bringing data back to its owners
Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week, we explore decentralized...
Five worthy reads: Data center operations through the eyes of AI
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about...
Beware of malware attacks: Little-known facts and why they matter
Did you know that nearly 560,000 new instances of malware are detected every day? As cybersecurity advances, threat actors develop malware with new tricks that...
Five worthy reads: Differential privacy—what it means for businesses
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we explore one...
Enable multi-factor authentication for Outlook Web App logins and secure enterprise emails
In March this year, organizations employing Microsoft Exchange were in for a shock when Microsoft announced that a hacker group was gaining access to organizations’...
Bilt Graphic Paper Private Limited saves $15,000 per year using OpManager
About Bilt Graphic Paper Private Limited Bilt Graphic Paper Private Limited (BGPPL), a subsidiary of Bilt Paper B.V., is a paper manufacturing company based in...
Malware alert: The RedXOR and Mamba attacks and how to defend against them
Picture this: It’s a normal day of working from home as usual since the COVID-19 outbreak. After that satisfying cup of coffee, you log in. But...
Five worthy reads: Password hygiene – The first step towards improved security
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week let’s go back to...