Featured Article: Domain Security

Featured Article: Domain Security

After a recent report found that poor domain security has left most Global 2000 companies vulnerable to the threats of phishing and brand abuse, we take a closer look at domain security and how businesses can maximise their protection against popular threats. CSC...
Featured Article : Who Was John McAfee?

Featured Article : Who Was John McAfee?

After John McAfee was found dead in a Barcelona prison cell last week, we take a brief look at the colourful life of this complicated, maverick software entrepreneur. McAfee Antivirus The products that made John McAfee a household name were his antivirus software and...
Featured Article : Life After Cookies

Featured Article : Life After Cookies

With Google recently committing to phasing out third-party cookies as Firefox and Safari have already done, we take a brief look at the possible alternatives and replacements for using cookies to track and understand user behaviour. Cookies Cookies are pieces of...
Featured Article – What is Zero Trust?

Featured Article – What is Zero Trust?

With mobile computing, software-as-a-service (SaaS), and now remote working moving the focus of IT security away from the traditional perimeter, this article looks at what a Zero Trust approach is and how it can help. More Complex Demands The belief among many IT...