Category: Cybersecurity Insights

Understanding Offensive Security

Approximately two billion records were stolen between July and October 2019. That’s just in one quarter of a year! This…

6 years ago

Navigating the World of Data Security in the Cloud: Steps to Ensure Compliance

Compliance ensures that an enterprise maintains a minimum standard of security-related requirements in accordance with industry and regulatory standards. Its…

6 years ago

Begin Here to Build a Trusted Business

According to the PwC 21st Annual Global Survey, reliability, congruence, consistency, and transparency are the four pillars for building trust…

6 years ago

Security or Functionality? Security Risks with Digital Transformation

Digital transformation has been adopted by most companies from around the world, resulting in a more connected and innovative business…

6 years ago

How Technology Can Simplify IT Security

Just last year, the popular Q&A site Quora suffered a data breach, as reported by Techworld in their article on…

6 years ago

Identity and Access Management for Social Engineering Attacks

When in action, a social engineering attack could look like an email received from a government organization or your own…

7 years ago

Security vs. Usability

Security vs. usability - the debate has been around for quite a while now. Which one would you prioritize? Would…

7 years ago

Prevent Online Identity Theft with Akku

Online identity theft, simply put, is impersonation on an online platform. If someone else pretends to be you -- either…

7 years ago

Data Protection & Data Privacy – A difference that matters

Data protection and data privacy are so closely linked that people (and sometimes even organizations) tend to think of them…

7 years ago

Healthcare Data, HIPAA Compliance, and Akku

The Health Insurance Portability and Accountability Act (HIPAA) has been effective in the USA since 1996.  The Act actually has…

7 years ago