Peter Sandilands

Authenticating With or Without Passwords – Webinar And Presentation Kit

How we authenticate ourselves online is of paramount importance. Traditionally, passwords have been the go-to method, serving as a unique identifier to confirm one’s identity. However, the landscape of authentication has witnessed significant evolution, largely driven by vulnerabilities associated with password-based systems.

Read More »
Security

Reacting to a Cyber Incident

Reacting to a cyber incident can be daunting, but panicking and making mistakes can worsen the situation. Learn how a digital forensics incident response (DFIR) retainer can help you minimise the impact and ensure timely access to expert help.

Read More »
data center

Should Data be Masked?

The prospect of losing personal information (PI) should terrify most organisations. But PI is essential to success. Here are several mitigation strategies.

Read More »

Search