The technology industry is definitely one of the largest and fastest growing industries out there. Careers in technology spread across the landscape of the global economy from software engineers...
With the rise in Artificial Intelligence across the landscape of the world and the disruption it brings to almost every aspect of human life, no one wants to miss...
In my previous article on AI (Artificial Intelligence): the past, the now and the future- you can read it here. I did mention how the world of artificial intelligence...
A tabletop security exercise is a discussion based interactive session where stakeholders meet in either formal or informal setting (meeting or conference room) to discuss roles and expected responses...
Physical key management is important in today’s business world, although oftentimes overlooked and approached with levity. Effective key control is key for security, managing risks, and protecting assets of...
Social engineering is a human threat vector from cybersecurity point. It simply means the criminal action of exploiting human nature rather than technical path to gain unauthorized access to...
Contemporary physical security is concerned with traditional security roles, assets protection, and loss prevention. All services are offered concurrent such that it cannot be cleared understood by a lay...
Workplace violence is an inevitable security risk which your organization should get ready to deal with. Having emergency preparedness plan in place will provide formidable leverage for your business...
Phishing is a type of social engineering attack built on manipulating and deceiving people to reveal confidential and private information which is then used to carry out further crime...
Travel security refers to measures taken by an intending traveler to ensure protection for self and luggage. In an increasing global village, travelling both local and overseas has become...