How a vulnerability management program can help identify cyber risks
According to research by Deloitte, only 25% of organisations are scenario planning to defend against the onslaught of cyberattacks. The
Read More4 Top challenges of digital transformation in South Africa
New technologies like cloud computing, artificial intelligence (AI), machine learning, and predictive analytics, continue to disrupt industries. They promise lower
Read MorePassword management – why your enterprise needs one now
Nearly every web page someone visits, will insist that a user profile is created. This profile, will then require you
Read More3 Core cybersecurity solutions you absolutely need
The rapid pace of digital transformation sees security professionals on the cutting edge of constant change. Along with the excitement
Read MoreYour 6-step incident response plan to promote better security
They say that “prevention is better than cure” but perhaps we can make a small addition to that. Prevention is
Read MoreYour 6-step guide to penetration testing for better security
According to the Ponemon Institute’s 2017 Cost of Data Breach Study, 70% of organisations believe their security risk increased significantly
Read More6 Security risks you should be aware of when using cloud storage
In 2018, there were approximately 3.6 billion consumer cloud users across the world, a 50% surge from the 2.4 billion
Read More5 Tips to better API security
Application programming interfaces (APIs) are the unsung heroes of the connected virtual world. Why? This software intermediary helps secure our
Read More5 Steps to cultivate cybersecurity culture in the workplace
The most valuable asset of any company is, of course, your workforce. Unfortunately, your employees often fall prey to online
Read More