knowledge center

The Glossary of a Cyber Security Operations Centre

The Glossary of a Cyber Security Operations Centre

The technology sector has always been awash in acronyms. For reasons such as efficiency, clarity, and standardisation, that's no different in cybersecurity. To help you navigate the acronyms used for Cyber Security Operation Centres (CSOC), here's an overview of the...

Galaxy Tab S9 FE & Buds FE: Packed with all of your favourite features

Galaxy Tab S9 FE & Buds FE: Packed with all of your favourite features

The Samsung Galaxy S Series are made for those who need mobile devices and accessories that can keep up with their corporate demands. With its Galaxy Tab S9 and Galaxy Buds2 Pro, Samsung aimed at supporting business users to work anywhere, any time. To extend on this...

Fairphone 5, a new standard for sustainability

Fairphone 5, a new standard for sustainability

For years, Fairphone has set an example of how technology companies can be greener and more sustainable. Think about their use of recycled and fair materials, longer software updates, and a modular smartphone design. With the Fairphone 5, the smartphone manufacturer...

Unfold your modern workplace with new Samsung Galaxy Devices

Unfold your modern workplace with new Samsung Galaxy Devices

By officially launching the Samsung Galaxy Z Flip 5, Galaxy Z Fold 5, the Galaxy Watch 6 Series and Galaxy Tab S9 Series, Samsung empowers your enterprise to take its modern workplace to the next level. Read on to find out how this new hardware aims at boosting...

Principles of Zero Trust Security

Principles of Zero Trust Security

In today’s world, cyber-attacks are increasingly prevalent, with the number of such incidents continually rising. These attacks can result in significant losses of time, money, and damage to an organisation’s reputation. It is not only large companies that are...

What is Microsoft’s Extended Detection & Response (XDR)?

What is Microsoft’s Extended Detection & Response (XDR)?

XDR is one of the newest solutions within endpoint security. In contrast to traditional security technologies such as Antivirus (AV) and Endpoint Detection & Response (EDR), XDR offers a holistic approach to detection and response. It encompasses endpoints,...

Data Security & Compliance In The Modern Workplace

Data Security & Compliance In The Modern Workplace

As increasing amounts of sensitive data are stored within organisations and the number of incidents where significant amounts of data have been lost or stolen are on the rise, regulatory pressure to ensure protection continues to increase. With new threats, such as...

Why your organisation is not fully exploiting its technology stack

Why your organisation is not fully exploiting its technology stack

The ability to manage and secure work devices, wherever they are, is fundamental to any IT strategy and never more so than in today’s decentralised workplace. The evolution of device management tools from Mobile Device Management (MDM) to Enterprise Mobility...

mobco academy

No event found!

mobco events

No event found!

mobco whitepapers

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.