Padlock and laptop keyboard. Cyber security concept

Cybersecurity outlook: Planning for protection

Protecting against cyber-threats has never been more important. In September, according to Hacker News, the US government dismantled the Raptor Train botnet that managed to capture more than 200,000 devices; there was a rise in phishing lures using potent ...

Smart phone security concept

Scalable and secure DevOps practices with Azure

Limited development tools can directly impact DevOps scalability and security. Forrester’s Total Economic Impact study of Azure Integration Services found that a ‘lack of automation by integration and DevOps’ was a leading cause of delays, mistakes, poor ...

zero_trust_and_managed_services

Zeroing in on Zero Trust

Zero Trust is a proactive, integrated approach to security across all digital layers that explicitly and continuously verifies every transaction, asserts the least privilege, and relies on intelligence, advanced detection, and real-time response to defend against threats.

business

Assessing Your Cloud Options

Written by: Mint Group Head of Channel, Pieter Du Toit and Software Infrastructure Lead, Junaid Essop Increasingly, businesses are transitioning to the cloud, but to do so without assessing how to complete the journey most effectively first is to invite d ...