Transform Your Enterprise Authentication
Technology | 27/10/2021

CENTAGATE BOX is a FIPS 140-2 Level 3 compliant secure hardware appliance that integrated with Common Criteria EAL4+ Certified CENTAGATE...Read More

Assessing the Efficacy of Your Security Operations using BAS
Technology | 21/10/2021

Breach and attack simulation (BAS) software is used to mimic real-world security threats to help businesses prepare incident response plans...Read More

Account Takeover Attacks Are Taking a Toll on Financial Services Firms, Sift Reports
Technology | 19/10/2021

Financial-services firms, and fintech particularly, have been swamped with account-takeover attacks over the past year, leaving many consumers wary of...Read More

Guide to ISO27001 Implementation
Technology | 14/10/2021

We’re not going to lie: implementing an ISO 27001-compliant ISMS (information security management system) can be a challenge. But as...Read More