How To Ransomware Proof your Backups Organizations worldwide are in the midst of a massive wave of cybersecurity threats. Gartner reported that “ransomware Read More >>
Nine Questions Every CTO Should Ask Before Their Business Moves To The Cloud It can seem like every business is moving to the cloud these days. It’s easy Read More >>
ActivEdge Technologies Advanced in Ixia Technical Knowledge In today’s technology world, computers and computer networks are attacked in attempts to expose, alter, Read More >>
ActivEdge Technologies: The Trailblazer in Deploying Identity and… With the constant IT landscape transformation, Identity and Access Management services have become an important Read More >>
Harvest of Awards: ActivEdge becomes F5 Gold Unity Partner, emerges Rising Star in Africa *Bags two awards at BOICT ActivEdge Technologies, a leading Pan-African Information Technology company is in Read More >>
Slack hands over control of encryption keys to regulated customers Slack announced today that it is launching Enterprise Key Management (EKM) for Slack, Read More >>
SCADA and Secure Infrastructure Recently Chuck McAuley wrote on how his father taught him how to “think sideways” or Read More >>
Data in Action: IoT and the Smart Bearing The Internet of Things (IoT) represents a big wave of technological change, and organizations in Read More >>
Establish a data classification model for cloud encryption Data encryption might seem like a given in any IT security strategy, but it still Read More >>
DDoS attackers increasingly strike outside of normal business hours DDoS attack volumes have increased by 50% to an average of 3.3 Gbps during May, June Read More >>