How SaaS security became one of the most overlooked threats in the enterprise – and what you can do about it
The evolution of Software as a Service (SaaS) SaaS applications have undergone an evolution in the past 10 years. What used to be simple web applications [ ... More Here > ]
Reduce your attack surface for ransomware with Zero Standing Privilege
If you look back on the majority of ransomware attacks, certainly in the last five years, the cause has been either a compromise of privilege [ ... More Here > ]
Taming major security risks in the wake of Log4j
Organisations worldwide are still reeling from the discovery of a major security vulnerability in Apache Log4j, an open-source logging utility embedded in countless internal and commercial [ ... More Here > ]
What’s Next in Cyber?
For decades, we’ve watched the same narrative play itself out. A better network solution here and a smarter data protection tool there… we’re building solid, [ ... More Here > ]
Using Cyber Risk Analyser to Combat 3 Common Security Mistakes
These days, there is no such thing as a genuinely secure system, breaches will happen, but resistance is not futile. The focus should be to [ ... More Here > ]
How to Keep Ransomware at Bay? A Continuous Security Assurance Process!
Concern about ransomware attacks is felt by all. With no easy remedy in sight, the continually evolving ransomware threat requires cybersecurity leaders to strengthen defences [ ... More Here > ]
Multi-factor authentication: low-cost high-reward cybersecurity control
With the rise in sophistication of credential-related threats such as social engineering and brute force attacks, passwords on their own just aren’t secure enough. The [ ... More Here > ]
Consistency of controls: The death of the firewall
The dissolving network perimeter is forcing IT leaders to accelerate their network and security transformation. To better manage risk, security programs should be refocused for [ ... More Here > ]
Top 10 cybersecurity predictions for 2022
With 2022 fast approaching, it’s good practice not only to reflect on what you’ve achieved over the past year, but to look ahead and consider [ ... More Here > ]
Planning for cyber recovery is vital; six key considerations
It’s all well and good thinking about protecting, detecting, and responding to an incident – but what is the point if you cannot recover? The [ ... More Here > ]
The Impacts of Botnets-as-a-Service: Evidence Vs Perception
Ransomware is only one possible outcome of advanced persistent threat activities and one that we focus on too much. This leads us to ignore other [ ... More Here > ]
Better Cybersecurity Log Management: It’s all about System of Record
The matter in question is no longer if you will encounter a breach but undoubtedly when you will experience it, which is why the key [ ... More Here > ]