Australia is under attack!

Australia’s recent run of serious data breaches has left many commentators asking some very pressing questions. It seems as though there’s perhaps a lot more to it than meets the eye. Yes, one could describe […]

A guide to CIS Benchmarks

A guide to CIS Benchmarks

CIS benchmarks are specifically followed to secure applications at the configuration level. These activities include server hardening, cloud configuration reviews, browser or database hardening, etc. While OWASP provides insight on application security and common vulnerabilities […]

Do you have the right IAM policies to secure your public cloud?

IAM policies for security

In a cloud security breach, the problem is misconfigurations in identity and access management (IAM policy). In a tight regulatory environment, a robust IAM policy can secure your cloud environment from inadvertent data leaks. A […]

The Impact of Artificial Intelligence on Organization’s Security

Artificial Intelligence

The new-age technologies such as Artificial Intelligence (AI), Machine Learning (ML), and Robotics are driving the biggest technological and organizational changes since the 4th Industrial Revolution. However, these are associated with potential opportunities as well […]

The definitive cyber security checklist for enterprises in 2022

data classification and protection

 An iron-clad cybersecurity program will leave bad actors floundering in 2022. Entersoft shares a definitive cyber security checklist for you to bear in mind while designing your strategy for the coming year What could be […]

Data classification – the first step towards automating data protection

data-classification-protection

Digitalization is an irreversible trend shaping the future, with countless benefits for people and industries. However, with almost all aspects of life, work and commerce now online, data protection and data security is a critical […]

Microservices architecture, Kubernetes and application security

sme kuernetes

Since Kubernetes is a container management tool, it is important for teams to secure their application at the start and end of every activity – in the pre-production and deployment stages. DevOps and automation are […]