Thanksgiving UpdateWhile the rest of the world was working on feasting on Turkey, we were working on Jump.New ModulesJump now ships with four additional modules and documentation is available in the knowledge base.
Cyber Security Threats to Look Out for in 2016If you read our 2016 predictions for IT you would have noticed our 2nd prediction was “we’ll all be hacked”. As I mentioned the threat and top of mind placement for Cyber Security is stating the obvious. Cyber Security at top of mind has been a…
Understanding Two Factor Authentication SolutionThe most common authentication today is the single factor authentication which everyone uses. In the single…
Cyber Security In Kenya: Securing The PhoneWhy the Kenyan government and key players in the private sector need a secure mobile…
Companies Can Share Cyber Threat Information AND Protect PrivacyIn Cyber Security, Companies can Collaborate AND Protect PrivacyThe controversial Cyber Information Sharing Act (CISA) cleared a key hurdle in the Senate this week and is likely headed for a…
You Have to Plan as if Data Breaches Are Going to Happen…Because They AreAssumption of Breach, Part I: A New Approach to Cyber Security