Challenges in securing Structured vs Unstructed Data
According to IPH, it detected unauthorized access to its document management system which stored its own administrative documents as well as that its clients and their correspondences......
Creating a Safe and Secure Remote Work Environment
As the usage of our mobile devices shift from personal to business use, this poses a significant threat to corporate security due to its high touch points......
Building Resilient Mobile Apps with i-Sprint’s AppProtect+
Mobile devices are no longer used just to take photos, make calls or send messages, with the advent of ever increasingly more powerful and feature-rich smart phones......
Document Security: The next big Challenge
A recent news dated on 10th Mar 2023 from The Straits Times titled, The Big Story – Military Docs Leaked Online, where leaked confidential defence documents have been......
Position: Senior Technical Consultant
Apply Now Position: Senior Technical Consultant [...]
Trends in Identity and Access Management: How Does the Future Look?
Identity and access management (IAM) is the foundation of secure digital transformation. By managing user identities and their access permissions to different resources, organizations gain transparency, trust, and control over their digital journeys......