Cybersecurity in 2019: Expectation Vs Reality

In 2019, 32 percent of breaches and 78 percent of cyber-espionage incidents were carried out through phishing attacks. Automation gained grounds in security operations across many organisations this year. To make growth in the right direction, it’s important to learn from history and carve the future strategies accordingly. The year 2019 saw cybersecurity technology advancing and evolving new tool...

Read More

The Most Common Passwords Found From Breaches in 2019

Researchers analysed data leaked in various data breaches to bring this study forward. Passwords ‘12345,’ ‘123456,’ and ‘123456789’ were the most common passwords, followed by ‘test1’ and, of course t...

Read More

The Tale of Ali Baba Is Why We All Need Multi-Factor Authentication!

One day, Ali Baba, a poor woodcutter is out hard at work chopping wood in the forest, when he is suddenly distracted. Paying closer attention, he overhears a band of thieves gaining access to a magica...

Read More

5 Traits to Look for in an Effective CIO

There are times when you do not have the technology expertise required within your company to plan a project or to solve a problem that feels like it is crippling one or more business operations. Ther...

Read More

Aabyss - Dark Web Experience

Have you ever wondered about the Dark Web or would you like to see a LIVE disaster demo? Why not spend a morning exploring the Dark Web in a safe and secure environment with Aabyss!

Read More

Aabyss Ltd & Tandem Systems Ltd Announce Merger

Aabyss Limited announces the merger of Aabyss’ and Tandem Systems Limited’s business operations. As Aabyss welcomes Tandem’s clients into the larger company, it also embraces the employees who are joi...

Read More

Growth Starts with Goals!

The new year has been ushered in and we have found ourselves with another 365 opportunities in which to fulfil our aspirations. Figuratively speaking, most people take the new year as an opportunity t...

Read More