Category Archives: Security

It all adds up: Pretexting in executive compromise

Executives are prime targets for hackers using pretexting, a social engineering technique that builds trust with a fabricated story or narrative. This approach is more effective than traditional phishing as it establishes rapport between the attacker and executive. Pretexting involves creating a false connection with executives, such as pretending to be an old acquaintance or…

Papua New Guinea Sets High Bar in Data Security

Papua New Guinea (PNG) has recently announced its National Data Protection and Governance Policy 2024, which aims to secure sensitive data that needs to be shared externally. The policy encourages responsible data sharing among government agencies, businesses, and stakeholders while ensuring compliance with privacy regulations. PNG’s commitment to establishing a robust data protection framework is…

Leveraging no-code automation for efficient network operations

NetOps teams face challenges in maintaining production services due to outdated processes and growing infrastructures. No-code automation has the potential to address these challenges by allowing engineers to automate repetitive tasks, thereby enhancing efficiency and mitigating the risk of failures. Outdated processes hold NetOps teams back, with manual command-line sequences and individual ad-hoc scripts still…

Daily Newsletter

Subscribe to our free daily newsletter to get the latest summarized updates