What are 5G security risks?

5G vowed to profoundly change how people and machines interact. It proclaims another period of more prominent transmission capacity and quicker speeds which will release the Internet of Things (IoT) in everything from mechanical offices to self-governing vehicles. In any case, with this new age of system innovation set to […]

Read more


I was invited by Rob from Procordr to see an early demonstration of their cybersecurity platform, and I must say I was impressed. It certainly would give me as a CISO the required information that all CISO have been struggling to obtain into a single pane of glass. Procordr is […]

Read more

How to implement security in DevOps

DevOps is a set of methods that incorporates software development and IT operative processes all the while aiming to shorten the systems development cycle giving out continuous delivery with high software quality. It has brought a cultural change in business by transforming the way operations, developers, and testers cohesively collaborate […]

Read more


What is security governance? Security governance is the mechanism by which an organization integrates with Information technology and controls, monitors, and directs the Information security. It ensures that accountability in the organization exists. The strategies adopted are in coordination with the business objectives and rules and regulations. Governance of security’s […]

Read more

How Secure Are Your Home Workers?

Introduction The reality of today’s workplace has turned grim, in response to the current COVID-19 epidemic. Several companies across the world have rolled out work-from-home strategies. As a result, there has been a massive influx of employees that are working remotely, connecting to their respective corporate networks and employing cloud-based […]

Read more
VPN Remote Access

Top Business Benefits of Using SD-WAN

Nowadays, companies are increasingly employing digital transformation to keep pace with varying customer demands and evolving market trends. For solving the complexities of the digital transformation, the traditional network architecture aren’t sufficient to handle such workloads. As a result, the team of skilled network operations is moving towards software designed-WAN. […]

Read more