Today, Disaster Recovery as a Service (DRaaS) had increase in popularity as a solution by organisation to ensure the reliability of their organisations in responding to unplanned events that can disrupt operational processes and efficiencies. DRaaS is an offering that enables disaster recovery through the cloud, in other words, a cloud-based disaster recovery. The adoption
In the modern world, organizations and institutions, regardless of their size or location, face a new reality: the digital realm, where physical borders cease to exist. Thanks to the internet and cyberspace, the barriers that once confined nations and their governance systems are now just a browser click away from being traversed. This transformative shift
The rapid growth in the number of data has catalyzed the evolution of numerous facets within the digital landscape, including computing. In recent times, we have observed the rise of fabric computing, which has introduced a pioneering paradigm by revolutionizing traditional computing architecture. This innovation encompasses diverse computing approaches that facilitate the seamless operation of
As technology continues to advance and digital transformation takes hold, cybersecurity becomes an increasingly important consideration for individuals and organizations. Password authentication has been the most commonly used method for data security and protection in most applications, but it is no longer considered sufficient to protect against modern cyber threats. Passwordless authentication is a newer
As organisations become more digitalised and interconnected, the management of digital identities and access to resources has become a critical aspect of cybersecurity and risk management. Identity Governance and Administration (IGA) has emerged as the solution to address this aspect, integrating processes, policies, technologies, and systems to facilitate effective user access management – providing the
In today’s world, passwords alone are not enough to protect our online accounts. As we manage dozens of accounts, keeping every password unique and complex is becoming increasingly burdensome, leading to users reusing passwords, which can lead to chain attacks when one password is revealed to hackers. The vulnerabilities of passwords, coupled with the possibility
Transition to the new PCI DSS v4.0 is in everyone’s mind right now. The PCI Security Standards Council (PCI SSC) issued version 4.0 of the PCI Data Security Standard (PCI DSS) on March 31, 2022. The PCI DSS is a global standard that establishes a baseline of technical and operational standards for protecting account data.
Authentication is an essential step in cybersecurity. In the recent years, passwordless authentication as an authentication method has become critically important as cyber attacks continues to evolve due to various adoption of technologies and practice into the IT infrastructure. The importance of passwordless authentication had also been highlighted by trusted research and advisory firms like
Since the world transitioned to the digital economy in 1995, we use the first consumer e-commerce transaction as a milestone. Everyone knows whatever application security is as strong as your user password, or as weak as the weak password being used. From increasing the lengths, complexity of the password, and frequently changing the password. From
Digital transformation had brought many impacts to the world we are living today. One of the impact is massive utilisation of internet applications in various daily activities and adoption of IT system in organisations. Until today, password authentication remains as the most implemented authentication method for data security and protection in most applications. Recently, as
- 1
- 2