As organisations continue to face cyber threats and vulnerabilities, the need for effective cyber risk management practices has become increasingly critical. However, many current practices fall short in producing the intended results, and organisations must also...
Data Security
Eliminating the man in the middle
The time is 12:53pm. You just got to your favourite coffee place to seal the deal with an exciting prospective client. Suddenly you remember that there’s a document on your company server that you need to quickly go through before your prospective client arrives. You...
Top Cybersecurity Trends To Lookout For in 2022
The world of technology is an ever changing one with cybersecurity being the epitome of that. Cybersecurity is an area in which the inability to adapt to change has visible and almost immediate negative consequences. It is because of this that even though it is hard...
Top cybersecurity trends in the financial sector
As digitalisation in the global financial services sector and digital banking channel adoption gather pace, the risks posed by cybercriminals will accelerate in unison. The global COVID-19 pandemic also drove a surge in cyberattack attempts on banking institutions....
Understanding the cybersecurity mesh and its impact on your enterprise
In a rapidly evolving digital world, one can be forgiven for feeling overwhelmed with the width and breadth of threats, innovations, and technologies an organisation has to be aware of to stay ahead of the curve. Compounded with the shift in landscape brought on by a...
Rethinking cybersecurity attacks and how to manage them
Attacks are going to happen. As sure as the sun rises in the East and sets in the West, you can trust that an attempt on your network at one point or another is inevitable. Check Point Research estimates there has been an astounding 97% year-on-year increase in...
Zero Trust Architecture: Best Practices for Safer Networks
A zero trust architecture enables organizations to prioritize access and restrictions. The goal is to implement a zero trust policy across all traffic, to ensure no user, device, or system can put the network at risk. Zero trust architectures typically enforce three...
Avoid Alert Fatigue: How to Automatically Get Rid of WAF False Positive
Alert fatigue – introducing false positives in WAF All WAF experts know what it’s like handling massive amounts of alerts. They’re also very likely wasting a lot of time fishing false positives out of all these alerts. The WAF’s purpose is to block attacks and let...