Validating an Architectural Approach to Cybersecurity

Written by admin

May 11, 2022

May 11, 2022

We started this morning with a conversation about cyber security with a client. Now our first session of the conference is cyber security. This topic is so important with the threat landscape of today.

#Fortinet 

Related Articles

Micro-SaaS Vetting: The 5-Minute Security Check for Browser Add-ons

Micro-SaaS Vetting: The 5-Minute Security Check for Browser Add-ons

Browser add-ons have a funny reputation. They feel “small”. A quick install. A tiny productivity boost. A harmless little helper that lives in your toolbar.But in practice, a browser extension is more like a micro-SaaS vendor sitting inside your browser session. It...

“Clean Desk” 2.0: Securing Your Home Office from Physical Data Leaks

“Clean Desk” 2.0: Securing Your Home Office from Physical Data Leaks

In the traditional office, a “Clean Desk” policy was a simple habit: shred the sensitive stuff, lock it away, and don’t leave passwords where someone can see them.In 2026, the same idea still matters but the “desk” has changed. For many teams, the home office is...

“Clean Desk” 2.0: Securing Your Home Office from Physical Data Leaks

“Clean Desk” 2.0: Securing Your Home Office from Physical Data Leaks

In the traditional office, a “Clean Desk” policy was a simple habit: shred the sensitive stuff, lock it away, and don’t leave passwords where someone can see them.In 2026, the same idea still matters but the “desk” has changed. For many teams, the home office is...

Stay Up to Date With The Latest News & Updates

Follow Us

Join Our Newsletter