BLOG

Is your IAM strategy demanding growth? It should be

The increasing risk of complex security threats continues, as well as the stride at which hackers are developing new ones. 

Read More

Cyber News: The Low-Down On Superbalist’s Most Recent Phishing Scam

Popular online fashion retailer, Superbalist was subject to criticism after some of its customers became victims to a phishing attack

Read More

How your IAM can pave the way for successful Single-Sign-On implementation

Frameworks used for identity and access management include single sign-on applications, multi-factor authentication and privileged access management (PAM).  These tools provide the capabilities to

Read More

5 Reasons Your Business Needs Multi-Factor Authentication

Your company’s biggest cybersecurity threat?  Your employees.  They account for approximately 50% of breaches to date. It’s, therefore, important to

Read More

How you can prevent cyber threats today

Cyber threats have become a daily struggle for businesses. Recent trends have revealed a significant increase in breached and hacked

Read More

The low down on cyber attacks and how it can impact your business

The recent rise of cyber attacks has become a great concern for everybody across the globe.  In South Africa, global

Read More

Security vs. compliance. Why it has to be both

The rise of digital transformation has meant that audit and regulatory compliances are a constant battleground for many security professionals. 

Read More

Your people are your strongest cybersecurity asset! Here’s why:

Every organisation is packed with assets, from their premises to their information and data.   Identifying which assets are vital is

Read More

Seven ways to make your digital identity strategy effective

Over the years digital identities have gone mainstream. This is due to the increasing number of data breaches experienced by

Read More