Digital transformation has been a buzzword for over a decade, progressing at varied speeds across different industries. Paradoxically, the recent Covid-19 pandemic is about to accelerate digitisation and digital transformation…
Threat management solutions and services for information security come in a broad range of different types, the applicability of which depends upon the nature of your organization, your specific needs,…
Let’s address the elephants in the room. SIEMs, EDRs, SOCs and MSSPs. The first problem with these technologies is that they’re listed as effective controls or approaches in most security standards….
Over the past few years as we have assisted organizations in containing, remediating and recovering from major breaches, as with the Security Information and Event Management (SIEM) boon we now…
If your organization is worried about its network security, congratulations! You should be. If you weren’t, we’d be worried. Unfortunately, information security is an often-overlooked, but crucial, feature of a…
The threat posed by state-sponsored threat actors on critical infrastructure has been a heated topic of discussion since 2010 and again this week the ACSC raised further concerns. While a lot…
While it can be argued that cybersecurity is everyone’s responsibility, some are better placed to deal with threats. Having the knowledge and ability to deal with ransomware, and ultimately prevent…