As the realm of technology continues to evolve, the significance of cloud computing has grown exponentially. This paradigm shift offers unparalleled scalability, efficiency, and cost-effectiveness benefits. However, with these advantages come a host of security challenges that need careful consideration.…
Tag: Blog RSS Feed
10 Mistakes in Cybersecurity and How to Avoid Them
It’s easy to rest on our laurels. Prevent a few breaches – or go long enough without one – and you start to feel invincible. While our efforts are certainly laudable, we can’t get too comfortable. As defenders, we always…
OT Security: Risks, Challenges and Securing your Environment
Before the revolution of Information Technology (IT), the world experienced the revolution of Operational Technology (OT). Operational Technology is the combination of hardware and software that controls and operates the physical mechanisms of industry. OT systems play an important role…
Tripwire Patch Priority Index for August 2023
Tripwire’s August 2023 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft. First on the patch priority list this month are patches for Microsoft Office, Excel, Visio, Teams, and Outlook. The patches resolve 10 issues including remote code execution,…
Thousands of dollars stolen from Texas ATMs using Raspberry Pi
A Texas court has heard how last month a gang of men used a Raspberry Pi device to steal thousands of dollars from ATMs. According to local media reports , three men were arrested in Lubbock, Texas, after attempting to…
5 Common Business Mistakes in Ransomware Prevention Planning
One thing is becoming evident as ransomware attacks increase in frequency and impact: businesses can take additional precautions. Unfortunately, many companies are failing to do so. Most victims are sufficiently warned about potential weaknesses yet unprepared to recover when hit.…
What is ISO 27002:2022 Control 8.9? A Quick Look at the Essentials
The basic parameters that control how hardware, software, and even entire networks operate are configurations, whether they take the form of a single configuration file or a collection of connected configurations. For instance, the default properties a firewall uses to…
Achieving Superior Security with Continuous Compliance
In a digital-first world, safeguarding sensitive data and ensuring compliance with industry regulations are paramount. Enter “Continuous Compliance” – a dynamic approach reshaping the cybersecurity paradigm . As a key part of an effective compliance strategy, continuous compliance is pivotal…
2023 Cost of a Data Breach: Key Takeaways
2023 Cost of a Data Breach: Key Takeaways It’s that time of year – IBM has released its “ Cost of a Data Breach Report .” This year’s report is jam-packed with some new research and findings that highlight how…
Summary of South Africa’s Protection of Personal Information Act (PoPIA)
South Africa’s Protection of Personal Information Act (PoPIA), also known as the PoPI Act, is a comprehensive data protection legislation designed to safeguard the privacy and information of South African citizens. While Jacob Zuma assented to PoPIA in November 2013,…