previous arrow
next arrow
Slider

Blog

By Kate O’Flaherty

Have you heard of SIM swapping? The nasty form of attack was documented by ZDNet writer Matthew Miller last June, who detailed the horror show unfolding after he found his services had been hacked and his bank charged $25,000 by an attacker purchasing Bitcoin. Then more recently, a study by Princeton University

By Johannesburg

Regardless the state of digital transformation at an organisation, cyber security must always remain a corporate priority. But adding to the complexity of the ever-widening attack surface is the increasing reliance on cloud computing and the Internet of things (IOT), and the associated impact both these have on DevOps. With

By Smriti Srivastava

The conventional tools to ensure cybersecurity are not sufficient in today’s world especially in 2020 where using just anti-malware software or login audits will not work at par with rising threats. Organisations need more resources and powerful infrastructure to resist any type of data breach. To enable such strength, they

By Stu Sjouwerman

In the war against cyberattacks, employees are often viewed as the cracks in an organization’s defense. This is not because of any malice on the part of the workers, but rather because an absence of an ingrained security-minded culture can often lead an employee, strictly out of curiosity or mindless

By Jason Davison

From sophisticated spyware attacks to mass phishing via smartphones and the rise of facial recognition technology, the range and reach of surveillance threats to human rights defenders is growing. For security teams trying to keep activists safe, it is a cat-and-mouse game as attackers rapidly adapt to developments aimed at

Locations

Get a Quote

If you have questions or comments, please use this form to reach us, and you will receive a response within one business day. Your can also call us directly at any of our global offices.