What is DNS Hijacking

What is DNS Hijacking and How to Detect It

What is DNS hijacking? DNS hijacking, also referred to as DNS redirection, is a type of cyber attack that sees ...
Read More
Log4j zero day vulnerability

Log4j zero day vulnerability: How to protect yourself

The Log4j zero day vulnerability (CVE-2021-44228) is a remote code execution (RCE) vulnerability that allows malicious actors to take complete ...
Read More
Risk remediation in cyber security

Simple strategies for risk remediation in cyber security

Why remediation in cyber security is key to limiting the damage a breach can cause Remediation in cyber security refers ...
Read More
Open source security

Open source security software risks

What is open source security? Open source software security is the measure of assurance in the freedom from the risk ...
Read More
definition of impersonation online

Definition of impersonation – online safety

Definition of impersonation Online impersonation is when a malicious actor steals someone’s online identity in order to cause damage – ...
Read More
impact of cyber security on procurement

What is the impact of cyber security on procurement?

The procurement process needs additional technological resources to ensure appropriate risk mitigation Up-to-date procurement processes include various technologies in order ...
Read More
Cloud computing cloud security challenges

What are the cloud security challenges in 2022?

Taking a closer look at the main cloud security challenges, issues and threats found in 2022 As organisations right ...
Read More
What is SOC 2 and SOC 2 compliance?

What is SOC 2? 

Why SOC 2 compliance is important for protecting sensitive data and building customer trust SOC 2 (Systems and Organisations ...
Read More
What is the real cost of data breach? 

What is the real cost of a data breach? 

Cyberattacks are on the rise. Hackers are well-funded, better organised, and more sophisticated in their methods. Not only are they ...
Read More