night city banner

Cybersecurity Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
Preparing for Hong Kongs Protection of Critical Infrastructures
Richard Chiu
Preparing for Hong Kong’s Protection of Critical Infrastructures (Computer Systems) Bill

Critical infrastructure includes all the assets, systems, facilities, and networks that are essential to the proper functioning of a society’s economy, national public health…

Read More
Key Takeaways from the CSA Understanding Data Security
Lynne Murray
Key Takeaways from the CSA Understanding Data Security Risk Survey

As hybrid and multi-cloud environments become increasingly popular, identifying, prioritizing, and mitigating data security risks becomes increasingly complex. How can we…

Read More
The noodle soup of B2B IAM
Jose Caso
The noodle soup of B2B IAM and third-party identities

Introduction: A messy bowl of terminologyIdentity management is no longer just about employees. The…

Read More
Go Beyond FIDO Standards
Gregory Vigroux
Go Beyond FIDO Standards: Best Practices When Deploying FIDO Security Keys in Enterprise

Initially designed for the consumer market, the FIDO (Fast IDentity Online) standard aims to replace passwords with more secure authentication methods for online services.…

Read More
Keeping Your Data Safer with Enterprise Key Management
Brian Robertson
Centralised, Scalable, Compliant: Keeping Your Data Safer with Enterprise Key Management

The rise of multi-cloud environments, hybrid infrastructures, and stricter regulatory requirements has made cryptographic key management a major priority for enterprises around…

Read More
The Rise of Non-Ransomware Attacks on AWS S3 Data
Todd Moore
The Rise of Non-Ransomware Attacks on AWS S3 Data

A sophisticated ransomware gang, Codefinger, has a cunning new technique for encrypting data stored in AWS S3 buckets without traditional ransomware tools. Instead, they…

Read More