Cybersecurity Insights

Security Services

Threat Hunting – Cyber Risks Depend On The Ability To See Them

It's widely understood that cyber threats and risks are pervasive, which is why more businesses have CISOs and dedicated teams today. However, remaining proactive in threat detection is becoming increasingly...

Stop Lateral Communication Between Endpoints

In network environments, endpoints are frequently exploited due to their external-facing nature and ease of entry into the network. Many believe attackers or bad actors are only on the outside...

How Does Your Business Respond to a Cyberattack?

In the event of a cyberattack, how does your business respond? Since a cyber incident is an (inevitable) possibility, do you have a plan? Can you recover quickly and maintain...

Harden Endpoints – Be Less Vulnerable

Cybercriminals love endpoints. If we think about what an endpoint is - any device connected to your network, such as a desktop, laptop, printer, or smartphone where people are interacting...

Questions to Ask Your Penetration Test Provider

A penetration test is one of the best cybersecurity practices an organization can adopt, but with several methods and certifications available, you need to ask your penetration test provider the...

GDPR Data and Irregular Behavior Detection

Protecting against malicious outsider attacks is the most significant focus for cybersecurity teams, but it’s critical not to overlook or underestimate the threat from those who already have the access....

Cybersecurity and Your Supply Chain

In 2020, cybersecurity attacks on supply chains surged because of Covid-19, and it’s predicted that cyberattacks will cause $6trn (USD) worth of damages in 2021.  What is a supply chain...

Penetration Testing for E-Commerce Websites

E-commerce websites are hot targets for cybercriminals because of the volume of sensitive data exchanged.  To stay on top of the ever-evolving methods hackers use and prevent your e-commerce website...

Building A Business Case For Cybersecurity Investment

In 2021, working in SecOps or IT security makes investing in cybersecurity a no-brainer. However, it is not always easy to get this thinking and the necessary budget approved by...

POPI Data: How Irregular Behaviour Detection Aids Compliance

The upcoming POPI Act deadline has many organisations scrambling to reach compliance. With only a year to prepare since the Act was signed into law last July, many have had...

How POPIA maps GDPR

The deadline to be POPIA (Protection of Personal Information Act) compliant is fast approaching, and while it has roots in and parallels to GDPR (General Data Protection Regulation), being compliant...

How much does it cost to be POPI compliant?

With a pending compliance deadline of 1 July 2021, many South African businesses are scrambling to achieve some form of POPIA (Protection of Personal Information Act) compliance. Comparable to the...

Vulnerability Scans and Penetration Tests – the Basics

Enterprise networks and organizations form relationships based on a mutual share of information and trust. As a result, these companies hold large amounts of personal and sensitive data related to...

Cybersecurity For Online Console & PC Gaming

The Gaming industry is worth over 120 Billion globally and will be worth over 200 Billion by 2023. Most gaming providers are now cloud providers that provide an application online...

Why Merging Security and Network Operations Center (SNOC) Makes Business Sense

With the emergence of the Security Network Operations Center (SNOC), security and network operations are combined to optimise resource sharing, better protect corporate data, improve communication, increase efficiencies, and ensure...

More Insights