Greg Jones, Senior Product Manager, Semperis, explains the issues with relying on a recycle bin to help you in the event of a cyber attack
In the wake of the COVID-19 outbreak, we saw a massive uptick in sophisticated phishing email schemes. Google blocked over…
Does every device in your home really need to be connected to the internet? And could it be turned against you?
Cyber security is a highly volatile, changing landscape by its very definition. Ensuring efficient defensive posture requires continuous threat monitoring, developing defensive strategies to meet them, and implementing new countermeasures.
New technology poses questions over existing models. Just as cloud technology asked questions of our data, edge computing is now challenging cloud’s relevance.