Search
Thursday 23 February 2017
  • :
  • :

Posts by: icitsuser

How to Get Business Executives to Support Information Security

Many information security professionals are normally frustrated because of the reasons management gives as to why they couldn’t listen to...

Data Security and Cryptography: What You Need to Know

Data technology is becoming mainstream. Today, data is becoming our identity, and we are creating it at a wild pace. However, how can we...

Reasons Why Tableau Rocks

Tableau is revolutionary data visualization software which was developed by Tableau Software. Tableau connects very easily with nearly all...

The Ancient Cryptography History

The simple writing of a message that most people could not read is considered to be the earliest form or cryptography. The word...

Top 4 Cyber Security Threats In 2017

2016 can be described as the year that cyber security went mainstream, as it affected American politics. The issue of cyber security is...

9 Cyber Security Breaches of 2016

Every year, the IT industry loses billions of dollars due to cyber-attacks. A report on global risks in 2015 warned about rising...

Benefits of Information Security Architecture

The set of ad hoc activities will be transformed by the way information security is to be approached. These activities will be modified to...

What Is a Cryptographic Certificate?

A user’s public key, which has been signed and encrypted, using a private key of a well-known certificate authority, is what is...

An Introduction To Cryptography Algorithms

While many people don’t take the security of their systems seriously, it’s the number one priority for all organizations. This...

Cyber Security Certifications

IT professionals with experience and knowledge in cyber-security are being sought day in day out by businesses of all kind. Many...