Securing the Internet of Things in the Enterprise

Digital transformation is driving the growth and adoption of Internet of Things (IoT) devices in the enterprise and the trend is accelerating at an unprecedented pace. IoT device growth is far outpacing the growth of more traditional computing devices such …
Read More

Cat amongst the pigeons: Insider Threat

In building your cyber security programme, you have likely focused on protecting your perimeter and keeping unknown threat actors from accessing your systems, networks and data. In doing so, have you ever considered what the people you trust are doing …
Read More

Securing employee internet traffic

Alternatively, how did Barbara in Finance just download malware on the network? As the leaves are turning brown and we are being asked, once again, to work from home where we can, we, as IT and cyber security professionals, are …
Read More

Development Security in Focus

With this article, we hope to highlight good practices in software and application development. In short, what you should take into consideration to be able to develop secure applications and software, however and wherever they will be distributed. We will …
Read More

Breaking Down The Cyber Kill Chain

The cyber kill chain describes the process a threat actor would typically take to execute a cyber attack, starting with the initial scouting and scoping and ending with the exfiltration or destruction of data or encryption for ransom. To be …
Read More