Community driven content discussing all aspects of software development from DevOps to design patterns. Over the past few months, I have been helping aspiring cybersecurity professionals prepare for ...
No brand is immune to cybersecurity breaches, but certain practices can mitigate them better than others. Drawing from tried and tested cybersecurity policies and actions taken by different CCTV ...
Cybersecurity has never been more visible in the boardroom, and yet it has never been more difficult to justify.
At first glance, South African organisations appear to be modernising at an impressive pace. Cloud migration, hybrid work strategies, AI experimentation, internet of things (IOT) expansion, and an ...
Hacking can be a dirty word. It evokes images of a person sitting in the dark with a black hoodie on, hunched over a keyboard, in front of multiple screens, attacking an innocent business, or ...
The Australian government has released a voluntary code of practice for securing the Internet of Things (IoT) in Australia. The voluntary Code of Practice: Securing the Internet of Things for ...