Top 10 Tips on How to Improve Security Inside the Firewall

Big companies have significantly improved the security of the network perimeter, and despite considerable investments in this area, most enterprise networks remain vulnerable at their core. Techniques that have deployed […]

Cryptomining Hijacking – The Rising Malware Menace

In the last several years, cryptocurrencies like Bitcoin have been inaudibly growing in popularity, with an ever-larger number of people buying and selling them. With this gained popularity, bitcoin has […]

15 Practical Tips to Protect Your Computer from Viruses and Malware

Hackers (of the criminal variety) are a scary bunch—whether working as part of an organised unit or alone idealist with a political agenda, they’ve got the knowledge and the power […]

Top Ten Security Threats to Your Business and How to Protect Your Valuable Assets Against Them

Cybercriminals will always try to find ways to make money without having to do any of the hard work that comes with that. This occurs offline as well as online, […]

Next Generation Cybersecurity Solutions

Ten Recommendations for Choosing a Cybersecurity Solution for your Organisation. With cybersecurity at the centre stage of corporate boards’ agenda, there’s no shortage of security products on the market right […]

How to Establish Organisational Cyber Resilience and Agility

It’s Not Really About The 98% Caught, But Its About The 2% You Miss. Introduction You might become complacent and consider a cyber-attack against your business to be a remote […]

How to Build a Cybersecurity Program – Learn proven security strategies, techniques and best practices

The overall approach to developing a cybersecurity program, as with any venture should begin with pulling together a description of what is needed and why, to proceed to define how […]

The Future of Identity and Access Management in 2018 and beyond

Identity and Access Management (IAM) is sure to be increasingly an integral part of our personal and business lives as the technological and societal landscape continues to evolve rapidly. While […]

OWASP Top 10: A Practical Guide to Mitigating Application Risks

Despite the sophistication of web technologies, many web applications have experienced a data breach over the years putting millions of consumers’ sensitive data information in the hands of criminals. If […]

Passwordless Authentication: A Myth or Reality?

A password is like a key to our home. If someone steals it, there are chances he will use it to steal something else. We use these virtual keys everywhere […]