How to write an effective information security policy
An information security policy is the foundation of an enterprise security program, ideally establishing in clear language what the organization…
An information security policy is the foundation of an enterprise security program, ideally establishing in clear language what the organization…
SITA, the leading IT provider for the air transport industry, has made six predictions about how ultra-fast 5G networks will…
African telco operators face a landmark five-year period as they strive to reimagine their business models and build new capabilities…
Research shows far-reaching impact of Pay on Demand model, with users and their families living happier and healthier lives,…
With 5G poised to become widely available across the globe, enterprise organizations need to seriously consider the security implications of…
High-profile breaches have sparked interest in an emerging class of security software. The technology, named cloud security posture management (CSPM),…
Every technology organization today seems to practice the agile methodology for software development, or a version of it. Or at…
Safaricom recently penned a strategic agreement with Amazon Web Services (AWS), to see the Telco become a reseller of AWS…
Something is rotten in the state of Denmark—in all of Europe actually—and Amazon has been tight-lipped about it. It seems…
There’s no shortage of promising new technologies. The challenge lies in pinpointing the specific tools that have the potential to…
No more posts available. Thank you for scrolling this far.
No more posts available. Thank you for scrolling this far.