Mobile devices – convenience, security risk or both?

Cell phones, tablets, wearables and other mobile devices dominate our lives. I personally bring my trusty iPad to everywhere, and, like everyone else, have my phone with me at all times. The biggest attack surface for any enterprise, then, may…

The Zero Trust model and data-loss prevention

In a previous article on the GovCyberHub, I wrote about the Zero Trust model for security. There are many areas of cybersecurity that complement the Zero Trust model – and data security is one. Outside of the IoT world, the…