Contributed Article

Five steps to prevent insider threat actor movements

People are an organisations’ most valuable resource. But they can also be its greatest vulnerability, especially when armed with weak credentials, all-too-powerful privileged accounts, and security ignorance or hubris. The problem is
6 years ago

Building an archive of records without using paper

With the introduction of the 5% value-added tax law in the UAE, companies today face the challenge of digitising and securing their business transaction history. The federal law mandates organisations maintain accounting
6 years ago

Categories