News

Secure Web Gateway – implementation methodologies

Some say that Secure Web Gateway is a technology that is in its twilight right now. However, organizations s...
Read more

Cyber Essentials #6 – Happened… meaning – Incident Reponse

As stressful as it is, in case of reasonable suspicion, assume that a break-in has occurred and start remedi...
Read more

Cyber Essentials #5 – Ultimately, it’s about data!

Is it about stealing and using them, preventing access to them, declassifying, encrypting or deleting them. ...
Read more

Cyber Essentials #4 – Who accesses what?

In the past, IT resource access protection could not take into account the environment - the walled cast...
Read more

Cyber Essential #3 – Your Systems

Most of the people responsible for cybersecurity -or those who have been relegated to that responsibility be...
Read more
Please be advised that our website is using cookies for marketing, statistical and functional reasons. In order to optimize the content on our website and to adapt them to your individual needs, we use informations saved using cookies on users’ end devices. Cookies can be controlled by the user through the settings of their web browser. By contiuning to use our website without changing your web browser settings, you are accepting the use of cookies.
I accept More info