
Cybersecurity Learning Path and Azure
There are a number of learning paths available for individuals interested in developing their cybersecurity skills using Azure.
Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.
There are a number of learning paths available for individuals interested in developing their cybersecurity skills using Azure.
The practice of gathering, analysing, and disseminating information from publicly available sources is referred to as open source intelligence, or OSINT.
If you aren’t aware of “sextortion,” you may not be alone. The term doesn’t relate to any verifiably listed crime,
People on all levels are still making attempts to adopt the new “normal” that COVID-19 presented to the world. It
Even as ransomware continues to be at the forefront of global news and company after company reports attacks, many still
The main goal of the Zero-Trust Model is to ensure that no individual or organisation should have default trust.
A majority of savvy businesses have come to the realisation that cybersecurity is now an accepted part of their daily routine. It comes as no surprise that threat actors continue to try to overcome every barrier and in doing so, they are developing more sophisticated technology methods.
In order to understand the significance of SaaS Security Certification, one must first understand what SaaS is. SaaS is a
Social media is a location where bad actors could hack into someone’s account. Actions You Can Take to Protect Your Social Media Accounts
South Africa the remediation average cost (after ransomware) for a company was ~R6.4 million. This is an increase of ~R11 million from 2020 to 2021.
TransUnion South Africa joins the growing group of organisations that have been breached by hackers. Hacking of credit bureaus is not new
Ransomware is continually evolving, now a lot of actions that companies can take to assist in protecting their world from being destroyed
Exposure of a cyberhacking condition is often released by the hackers themselves and when that happens, a cold chill runs down the backs of everyone that may have had their personal and company data exposed.
I first interacted with Kavya on LinkedIn, he wrote a cybersecurity post that I found insightful and interesting. Here is
Cyber criminals have been targeting South Africa for attacks and breaches for decades. Knowing that many companies haven’t focused on
Today’s Cyber Security Requires a Change in the Way we do Things – with “Detection” as Constant Priority
Defending a company today requires due diligence and attention to cyber security. This topic is now considered to be part
The IAFCI, a non-profit international organisation, will provide services and an environment within which information about financial fraud, fraud investigation
The IACA is a non-profit, 501(c)(3) professional association comprised of criminal justice professionals, including working analysts, students, educators, researchers and
Partnering with a cyber security company is considered part of doing business in today’s world. However, not all cyber security companies are equal and selecting one that is the right fit for your organization can seem like a daunting task.
Log4j is an example of a company trying to do something as a fix that spiraled into a major problem. When the Apache Software Foundation released Lg4j 2.15.0 as a way to correct a remote code execution vulnerability (CVE-2021-44228, aka Log4Shell) it launched into an area that they never expected.
The People You Thought You Could Trust When you think of insider cybersecurity attacks, you might immediately envision an angry
Training staff is a priority aspect in deterring fraud attempts. Knowledgeable employees can become the first line of defence in protecting your company against a cyberattack.
The term “insider threat” sounds very ominous, but any time you trust an individual or another organisation with access to
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |