TechnologyTop StoriesFive cybersecurity awareness tips to protect your data against malware appsGBO CorrespondentOctober 27, 2022 GBO CorrespondentOctober 27, 2022 Despite hackers becoming increasingly skilled at creating phoney programs that appear to...
TechnologyTop StoriesThe sophisticated phishing scams: All you need to knowGBO CorrespondentOctober 26, 2022 GBO CorrespondentOctober 26, 2022 Phishing attacks are precisely what they sound like: the con artists call...
TechnologyTop StoriesBYOVD: The new threat for cybersecurityGBO CorrespondentOctober 21, 2022 GBO CorrespondentOctober 21, 2022 The term BYOVD was discovered by experts from the cybersecurity firm Sophos...
Banking and FinanceIssue 03 - 2022MAGAZINEThe resource-intensive process called M&AGBO CorrespondentSeptember 15, 2022March 31, 2023 GBO CorrespondentSeptember 15, 2022March 31, 2023 Nearly 60% of purchasing organisations do not presently use cybersecurity exposure assessments...
Banking and FinanceIssue 03 - 2022MAGAZINEFraud analytics: What the banks needGBO CorrespondentSeptember 15, 2022March 31, 2023 GBO CorrespondentSeptember 15, 2022March 31, 2023 A recent report from Telus International laid out a roadmap for financial...
Issue 01 - 2021MAGAZINETechnologyAir-gapped vault for the crypto worldGBO CorrespondentFebruary 25, 2021February 26, 2021 GBO CorrespondentFebruary 25, 2021February 26, 2021 An Israeli cybersecurity firm has developed state-of-the-art cryptographic techniques to block attackers’...