Posts Tagged ‘News Posts’
Clubhouse For Android Launched In The UK
Drop-in audio conversation social network app âClubhouseâ has launched its Android (beta) version for download in the UK. Clubhouse Android Launched In English-Speaking Countries San Francisco-based Clubhouse announced on May 9 that, starting in the U.S., and quickly following in other English-speaking countries, it was rolling out of the beta Android version of its popular…
Read MoreAI Keystroke Spy Tools A Possible Threat
With AI recently in the spotlight in Europe over the need to regulate over some âunacceptable useâ, some experts are warning of the threat of AI keystroke reading spy tools. Possibilities Companies like TypingDNA developing AI biometric verification (back in 2017) based on recognising the individual characteristics of how a person types, suggest that it…
Read MoreLife After Cookies
With Google recently committing to phasing out third-party cookies as Firefox and Safari have already done, we take a brief look at the possible alternatives and replacements for using cookies to track and understand user behaviour. Cookies Cookies are pieces of code/small text files used for tracking and stored on the browser of someone who…
Read MoreWhat Is Patching or Patch Management?
In this article, we take a brief look at the importance of patch management in maintaining security. Patches and Patch Management Patches are the software fixes for known security vulnerabilities in software such as operating systems, third-party applications, cloud-platforms, and embedded systems. Patch management is the ongoing process of distributing and applying those important security…
Read MoreTop five data security principles to follow when moving to the cloud
Why migrating to the cloud does come with risks that need to be addressed. In the wake of the Covid-19 pandemic, digital transformation has become essential for enterprises forced to adapt to new working conditions. Many organizations had already started their digital journey at the beginning of last year, but the global epidemic certainly accelerated…
Read MoreThese are the top cybersecurity challenges of 2021
Corporate leaders are increasingly elevating the importance of cybersecurity to their companies. But recent high-profile attacks show how much more needs to be done in the year ahead. Here are the five biggest cybersecurity challenges that must be overcome. The far-reaching cybersecurity breaches of 2020, culminating in the widespread Solarwinds supply chain attack, were a…
Read MoreThe road to permanent remote working
The transition into permanent remote working is inescapable now. Countless articles, morning talk shows and widely-shared social media polls have all indicated this irreversible trajectory. There is simply no recourse to âun-ring that bellâ. What may have started off as a necessity to adhere to social distancing regulations is progressively becoming a preference, a lifestyle choice and the norm…
Read MoreWhy working remotely will be the norm after COVID
Covid-19 changed the way of working. Most people, due to lockdown, were forced to move to remote working. It proved to be effective, even though there were some exceptions. The pandemic turned the whole world upside down. Many employers are sure that despite a number of errors, which accompanied the massive transfer of staff to remote work,…
Read MoreFive technology trends set to shape 2021
Let’s take a look ahead at the biggest technology trends set to shape 2021. In a recent McKinsey survey, executives said the share of digital products in their companies accelerated by seven years in just a few months. According to Shopify, there was 10 yearsâ worth of eCommerce growth in just 90 days during the…
Read MoreKey cyber security trends to look out for in 2021
Looking back on a year of unprecedented uncertainty, countless lessons have been learned across the board for everyone, including cyber security leaders and experts. The overnight change in working patterns meant millions of employees suddenly had to work from home, putting huge strain on access to IT systems. Threat actors werenât resting on their laurels…
Read More