Shadow IT refers to the usage of applications, devices, software, and other IT services outside the approval and guidance of the IT department. While it poses risks for employees and their...
Security Information and Event Management (SIEM) is a set of services and tools that combine Security Information Management (SIM) responsible for the consolidation of log files and data to generate...
A SIM swap attack is a cunning form of social engineering that exploits a mobile carrier's service to port phone numbers. In this scheme, attackers hijack a victim's phone number by...
The concept of storing data in a secure ledger is expanded to include computation in a smart contract. Therefore, they are essentially contracts that are carried out automatically and without the...
Smishing is a form of cyber attack utilising SMS (Short Message Service) or text messages to target individuals. It's a clever blend of "SMS" and " phishing ," the common...
Social engineering refers to a variety of tactics that can be used to trick people into becoming a victim of cybercrime, for example, by opening a malicious attachment, clicking on an unsafe link or...
Software Defined Datacentre (SDDC) refers to modern datacentres where the entire infrastructure is virtualised then managed and orchestrated via software. This means that hardware configuration and...
Software-Defined Networking, or SDN, is a revolutionary approach to network management that decouples the control plane from the data plane. Traditionally, network devices like routers and switches...
Software-Defined Storage (SDS) is an approach in computer data storage where the software is the one responsible for data management, data placement control and data provisioning, instead of the...
Spear phishing is a highly targeted cyber attack designed to deceive individuals or organisations into revealing sensitive information.
Unlike traditional phishing , which casts a wide net...