Risk Management and
Cybersecurity Blog

Do you enjoy our blog?
Why not subscribe to our monthly cybersecurity newsletter?

Subscribe now

How to become an ethical hacker?

How to become an ethical hacker?

Digital innovation offers companies several advantages, ranging from greater profitability and lower costs to increased employee productivity and the ability ...
Top data privacy tips

Top Data Privacy Tips For Online Safety

In today's fast-paced and increasingly competitive business landscape, digital innovation isn't just desirable if an organisation wants to thrive - ...
Zero Trust Network Access ZTNA vs VPN 

Zero Trust Network Access (ZTNA) vs VPN 

Between a mass migration to cloud computing environments in recent years, as well as the prolific and growing use of ...
What is a sandbox environment?

What is a sandbox environment?

With a staggering 17 million new instances of malware recorded every month, organisations can’t rely on detecting malicious code by ...
What are malware evasion techniques?

What is a malware evasion technique?

Malware evasion techniques alter the characteristics of malicious software to avoid detection by cyber security solutions that rely on patterns or ...
What is scareware? 

What is scareware? 

What is scareware? Scareware is a type of malware cyberattack that scares a person into visiting an infected site and ...
What is mobile malware? 

What is mobile malware? 

Mobile malware is designed to target mobile devices, such as smartphones and tablets, with the aim of accessing private data ...
What's the difference between opportunistic and targeted attacks? 

What’s the difference between opportunistic & targeted attacks? 

There are two main types of cyberattack: opportunistic attacks and targeted attacks. Targeted attacks are when a cybercriminal has a ...
CIS Critical Security Controls for Effective Cyber Defense

CIS Critical Security Controls for Effective Cyber Defense: What are They? 

Established in 2000, the Centre of Internet Security (CIS) is a global, non-profit community of experts that collectively develops tools, ...

How to become an ethical hacker?

How to become an ethical hacker?

Digital innovation offers companies several advantages, ranging from greater profitability and lower costs to increased employee productivity and the ability ...
Top data privacy tips

Top Data Privacy Tips For Online Safety

In today's fast-paced and increasingly competitive business landscape, digital innovation isn't just desirable if an organisation wants to thrive - ...
Zero Trust Network Access ZTNA vs VPN 

Zero Trust Network Access (ZTNA) vs VPN 

Between a mass migration to cloud computing environments in recent years, as well as the prolific and growing use of ...
What is a sandbox environment?

What is a sandbox environment?

With a staggering 17 million new instances of malware recorded every month, organisations can’t rely on detecting malicious code by ...
What are malware evasion techniques?

What is a malware evasion technique?

Malware evasion techniques alter the characteristics of malicious software to avoid detection by cyber security solutions that rely on patterns or ...
What is scareware? 

What is scareware? 

What is scareware? Scareware is a type of malware cyberattack that scares a person into visiting an infected site and ...
What is mobile malware? 

What is mobile malware? 

Mobile malware is designed to target mobile devices, such as smartphones and tablets, with the aim of accessing private data ...
What's the difference between opportunistic and targeted attacks? 

What’s the difference between opportunistic & targeted attacks? 

There are two main types of cyberattack: opportunistic attacks and targeted attacks. Targeted attacks are when a cybercriminal has a ...
CIS Critical Security Controls for Effective Cyber Defense

CIS Critical Security Controls for Effective Cyber Defense: What are They? 

Established in 2000, the Centre of Internet Security (CIS) is a global, non-profit community of experts that collectively develops tools, ...