Category: Uncategorized

BOEWE KAN GESTEELDE DATA SO GEBRUIK

BOEWE KAN GESTEELDE DATA SO GEBRUIK

Die data van miljoene Suid-Afrikaners wat ’n kuberkrakergroep gesteel het, kan uiteindelik daartoe lei dat georganiseerde misdaad, soos huisbrake en motorkapings in Suid-Afrika verder toeneem, maan kuberveiligheidskenners.

Read More
CYBERWARFARE AND THE RUSSIA-UKRAINE CONFLICT

CYBERWARFARE AND THE RUSSIA-UKRAINE CONFLICT

Cyberwarfare poses a genuine danger to businesses and private individuals globally. The risk of a cyberattack is heightened, but you can protect yourself.

Read More
CHOOSE RAPID7 FOR VULNERABILITY MANAGEMENT

CHOOSE RAPID7 FOR VULNERABILITY MANAGEMENT

Rapid7’s vulnerability management platform, InsightVM, thoroughly scans your network assets, on-premise or in the cloud, and identifies vulnerabilities and risks across all of your endpoints.

Read More
APPOINTING THE WRONG PERSON

APPOINTING THE WRONG PERSON

Does your organisation have a Chief Information Security Officer (CISO)? Are you thinking of appointing one?

Read More
NEWORDER and ACFE SA SETTING THE AFRICA STANDARD FOR PEN-TESTING

NEWORDER and ACFE SA SETTING THE AFRICA STANDARD FOR PEN-TESTING

With the exponential growth in cybercrime, there is inevitably high demand for Pen-testing

Read More