Latest news & articles

Zero-day attacks: Protections, best practices and how to implement them

Sources: InfosecInstitute Zero-day (0day) exploit, Imperva Cybersecurity: How to get your software patching strategy right and keep the hackers at…

By April 2020

Cyberspace Security in Africa – Where Do We Stand?

By Tomslin Samme-Nlar, Researcher Source: circleID Very few African states today have developed a national cybersecurity strategy or have in…

By April 2020

What is a Cyber Threat? How to Explain Cyber Threats to Your CEO

How to explain cyber threats to your CEO and others. Learn more about the potential for risk What is a…

By February 2017

Vulnerability And Patch Management

[vc_row css=".vc_custom_1452687555475{margin-bottom: 100px !important;}"][vc_column offset="vc_col-lg-9 vc_col-md-9" css=".vc_custom_1452702342137{padding-right: 45px !important;}"][vc_custom_heading source="post_title" use_theme_fonts="yes" el_class="no_stripe"][stm_post_details][vc_column_text css=".vc_custom_1487450619835{margin-bottom: 20px !important;}" el_class="no_stripe"] The purpose of the…

By February 2017

3 Essential Components to Build into Your Incident Response Program in 2017

[vc_row css=".vc_custom_1452687555475{margin-bottom: 100px !important;}"][vc_column offset="vc_col-lg-9 vc_col-md-9" css=".vc_custom_1452702342137{padding-right: 45px !important;}"][vc_custom_heading source="post_title" use_theme_fonts="yes" el_class="no_stripe"][stm_post_details][vc_column_text css=".vc_custom_1487449721337{margin-bottom: 20px !important;}" el_class="no_stripe"] In my previous role…

By February 2017

Database Architecture And Security

Security Architecture An essential but often missing element in an information security program is a well-defined and complete information security…

By February 2017

Threat Intelligence: Zero to One

Introduction Today, the biggest gap in the cyber security of organizations is that companies work in isolation while criminals are…

By February 2017

The role of the CISO, the CIO and the Board

Digital Transformation vs. Organisational Legacy The hybrid role of the CISO Beyond the functional distinctions we analysed in our reporting…

By February 2017