When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer.
With the pandemic, more organizations than ever started to transfer their data and apps to the cloud. It is then…
Third-party risk management programs are needed to protect against breaches
A report from Mastercard’s RiskRecon and the Cyentia Institute revealed that it was increasingly important for enterprises to have third-party…
Skills shortage would prevent SAP migration to the cloud
New research by Ensono revealed the impact of skills shortages on SAP applications and how they were managed. At a…
Indian Prime Minister urges to prioritise cybersecurity
Following a speech at the Bengaluru Tech Summit, a major Indian tech event, Indian Prime Minister Narendra Modi declared that…
Manchester United’s IT systems suffered a cyber attack
Last weekend, Manchester United was hit by a cyber-attack and is now working with Infosec pros in order to minimize…
Financial industries are now transferring data to the cloud
Although financial industries have been known to not allow data to go off-premises in order to retain direct control, especially…
Is AI GPT-3 gaining consciousness?
While AI is undeniably evolving more and more every day, the debate around AI’s possible consciousness is still very much…
Open Source Summit Europe unveils LF AI and Data Foundation
The Open Source Summit Europe unveiled a new organization under the Linux Foundation, the LF AI and Data Foundation, merging…
Security training needs to be implemented to face the new threats
As cyber threats are evolving and becoming more and more dangerous, it is now a necessity to train appropriately developers…
Businesses need DevSecOps for their application security
A recent survey by Contrast Security found out that many applications have 10 or more vulnerabilities, while developers state the…