Making and keeping a company’s IT infrastructure safe and secure from unauthorised intrusions or malicious actions has always been challenging. With the increased use of cloud computing, coupled with ...