Risk management and
cybersecurity blog
What is DNS Hijacking and How to Detect It
What is DNS hijacking? DNS hijacking, also referred to as DNS redirection, is a type of cyber attack that sees ...
Read More
Log4j zero day vulnerability: How to protect yourself
The Log4j zero day vulnerability (CVE-2021-44228) is a remote code execution (RCE) vulnerability that allows malicious actors to take complete ...
Read More
Simple strategies for risk remediation in cyber security
Why remediation in cyber security is key to limiting the damage a breach can cause Remediation in cyber security refers ...
Read More
Open source security software risks
What is open source security? Open source software security is the measure of assurance in the freedom from the risk ...
Read More
Definition of impersonation – online safety
Definition of impersonation Online impersonation is when a malicious actor steals someone’s online identity in order to cause damage – ...
Read More
What is the impact of cyber security on procurement?
The procurement process needs additional technological resources to ensure appropriate risk mitigation Up-to-date procurement processes include various technologies in order ...
Read More
What are the cloud security challenges in 2022?
Taking a closer look at the main cloud security challenges, issues and threats found in 2022 As organisations right ...
Read More
What is SOC 2?
Why SOC 2 compliance is important for protecting sensitive data and building customer trust SOC 2 (Systems and Organisations ...
Read More
What is the real cost of a data breach?
Cyberattacks are on the rise. Hackers are well-funded, better organised, and more sophisticated in their methods. Not only are they ...
Read More

What is DNS Hijacking and How to Detect It
What is DNS hijacking? DNS hijacking, also referred to as DNS redirection, is a type of cyber attack that sees ...
Read More
Read More

Log4j zero day vulnerability: How to protect yourself
The Log4j zero day vulnerability (CVE-2021-44228) is a remote code execution (RCE) vulnerability that allows malicious actors to take complete ...
Read More
Read More

Simple strategies for risk remediation in cyber security
Why remediation in cyber security is key to limiting the damage a breach can cause Remediation in cyber security refers ...
Read More
Read More

Open source security software risks
What is open source security? Open source software security is the measure of assurance in the freedom from the risk ...
Read More
Read More

Definition of impersonation – online safety
Definition of impersonation Online impersonation is when a malicious actor steals someone’s online identity in order to cause damage – ...
Read More
Read More

What is the impact of cyber security on procurement?
The procurement process needs additional technological resources to ensure appropriate risk mitigation Up-to-date procurement processes include various technologies in order ...
Read More
Read More

What are the cloud security challenges in 2022?
Taking a closer look at the main cloud security challenges, issues and threats found in 2022 As organisations right ...
Read More
Read More

What is SOC 2?
Why SOC 2 compliance is important for protecting sensitive data and building customer trust SOC 2 (Systems and Organisations ...
Read More
Read More

What is the real cost of a data breach?
Cyberattacks are on the rise. Hackers are well-funded, better organised, and more sophisticated in their methods. Not only are they ...
Read More
Read More