Working from Home, Firewall Security Guide – Part 1/5 (UK Cyber Essentials)
Original Post : https://www.linkedin.com/pulse/working-from-home-firewall-security-guide-part-15-uk-chani-simms/ Using a firewall to...
Working From Home
choosing the most secure settings for your devices and software – Part 2/5 (Cyber Essentials) Original post : https://www.linkedin.com/pu...
Stop chasing after the magic security box, look at the people
In this heartfelt and emotional talk, Chani shares the reasons why we need to be human centric when designing artificial intelligence-...
Cybersecurity tips for shopping safely this festive season
With Avurudu shopping season just around the corner, many of us are preparing to spend a sizable portion of our annual income on many...
How protected are you and your data?
Undoubtedly technology has become a daily part of our lives, and to be honest sometimes we feel a bit overwhelmed by it.
Decoding Sri Lanka's Cyber Security Bill 2019
It appears that after a long deliberation period, the Ministry of Digital Infrastructure and Information Security, together with Sri...
People, Process and Technology: Learn from traditional warfare strategies to fight cyberwarfare
An ancient Chinese military general Sun Tzu, in his book ‘The art of War’ recites that, “The supreme art of war is to subdue the enemy...
Raising the profile of women in information security
Clearly, women are not a homogeneous group when it comes to professions which require astonishing female talent. Global concerns have...
GDPR - Mind Map of Records Management
By now we should all know that the GDPR has become a beast of a regulation that not many organisations can avoid. It doesn’t matter where...
The Importance of Being GDPR Ready
What are the main features of the new law? Among the law changes proposed for the year, the General Data Protection Regulation (GDPR), is...