Cyber security

Creating a robust cybersecurity posture

Mohamed Osman, Head of Managed Services at Mint Group    No time to read? Snack on these:  Cyberattacks using stolen credentials up 71%, with 600+ million daily attacks  Traditional security isn't enough - organizations need proactive defe ...

Padlock and laptop keyboard. Cyber security concept

Cybersecurity outlook: Planning for protection

Protecting against cyber-threats has never been more important. In September, according to Hacker News, the US government dismantled the Raptor Train botnet that managed to capture more than 200,000 devices; there was a rise in phishing lures using potent ...

Smart phone security concept

Scalable and secure DevOps practices with Azure

Limited development tools can directly impact DevOps scalability and security. Forrester’s Total Economic Impact study of Azure Integration Services found that a ‘lack of automation by integration and DevOps’ was a leading cause of delays, mistakes, poor ...

zero_trust_and_managed_services

Zeroing in on Zero Trust

Zero Trust is a proactive, integrated approach to security across all digital layers that explicitly and continuously verifies every transaction, asserts the least privilege, and relies on intelligence, advanced detection, and real-time response to defend against threats.