BLOG

How a vulnerability management program can help identify cyber risks

According to research by Deloitte, only 25% of organisations are scenario planning to defend against the onslaught of cyberattacks. The

Read More

4 Top challenges of digital transformation in South Africa

New technologies like cloud computing, artificial intelligence (AI), machine learning, and predictive analytics, continue to disrupt industries. They promise lower

Read More

Password management – why your enterprise needs one now

Nearly every web page someone visits, will insist that a user profile is created. This profile, will then require you

Read More

3 Core cybersecurity solutions you absolutely need

The rapid pace of digital transformation sees security professionals on the cutting edge of constant change.  Along with the excitement

Read More

Your 6-step incident response plan to promote better security

They say that “prevention is better than cure” but perhaps we can make a small addition to that. Prevention is

Read More

Your 6-step guide to penetration testing for better security

According to the Ponemon Institute’s 2017 Cost of Data Breach Study, 70% of organisations believe their security risk increased significantly

Read More

6 Security risks you should be aware of when using cloud storage

In 2018, there were approximately 3.6 billion consumer cloud users across the world, a 50% surge from the 2.4 billion

Read More

5 Tips to better API security

Application programming interfaces (APIs) are the unsung heroes of the connected virtual world.  Why? This software intermediary helps secure our

Read More

5 Steps to cultivate cybersecurity culture in the workplace

The most valuable asset of any company is, of course, your workforce. Unfortunately, your employees often fall prey to online

Read More