Category: Uncategorized

ATTACK SURFACE MANAGEMENT – ARE YOU THINKING LIKE AN ATTACKER?

ATTACK SURFACE MANAGEMENT – ARE YOU THINKING LIKE AN ATTACKER?

The term “attack surface” has been around for a while but has only recently become popularised, with the increase in cyber risk and proliferation of cyberattacks.

Read More
HOW CRIMINALS CAN USE STOLEN DATA FROM THE TRANSUNION HACK

HOW CRIMINALS CAN USE STOLEN DATA FROM THE TRANSUNION HACK

Criminals can use stolen data for organised crime such as burglaries, car hijackings, fraud, and identity theft.

Read More
BOEWE KAN GESTEELDE DATA SO GEBRUIK

BOEWE KAN GESTEELDE DATA SO GEBRUIK

Die data van miljoene Suid-Afrikaners wat ’n kuberkrakergroep gesteel het, kan uiteindelik daartoe lei dat georganiseerde misdaad, soos huisbrake en motorkapings in Suid-Afrika verder toeneem, maan kuberveiligheidskenners.

Read More
CYBERWARFARE AND THE RUSSIA-UKRAINE CONFLICT

CYBERWARFARE AND THE RUSSIA-UKRAINE CONFLICT

Cyberwarfare poses a genuine danger to businesses and private individuals globally. The risk of a cyberattack is heightened, but you can protect yourself.

Read More
CHOOSE RAPID7 FOR VULNERABILITY MANAGEMENT

CHOOSE RAPID7 FOR VULNERABILITY MANAGEMENT

Rapid7’s vulnerability management platform, InsightVM, thoroughly scans your network assets, on-premise or in the cloud, and identifies vulnerabilities and risks across all of your endpoints.

Read More