Social Engineering 101

Social engineering is the art of manipulating others to gain access to their computer, IT systems, networks, or physical locations, typically for financial gain.

Phishing Attacks & How To Avoid Them

Welcome to our beginners guide to phishing attacks, we will be discussing the different kinds of phishing attacks, how they target your employees and how best to avoid becoming a victim to them.

Cyber Insurance Whitepaper

This cyber insurance whitepaper helps business leaders understand the pro's and cons of cyber insurance and takes a detailed look at what cyber insurance is, the different kinds of coverage, what cyber insurance covers and some of the problems with cyber insurance as it matures as an insurance product.

An ITSEC Guide To OSINT

OSINT means open source intelligence, in this guide we explain what it is, the different kinds of OSINT and the kinds of groups who leverage it.

An ITSEC Guide To DevSecOps

DevSecOps means ‘development, security and operations’ and the whole idea behind DevSecOps is to make everyone on your development team accountable for cybersecurity.

Cybersecurity Regulations In The Asia-Pacific Region

The number of people using the internet is increasingly growing, with more than one million users accessing the internet for the first time each day. Cybersecurity Ventures predicts there will be 6 billion Internet users by 2022 (75 per cent of the projected world population of 8 billion), the usage rate will increase up to %90 of the world population by 2030.

An Introduction To SOAR

Gartner recently announced a new category in their cybersecurity technology analysis called Security Operations, Analytics, and Reporting. On occasion, you will also hear cybersecurity professionals call it SOAPA (security operations analytics platform architecture) instead, perhaps because they want to punish us with yet another cybersecurity acronym, but pay them no mind, Gartner calls it SOAR and so should we.

Four Good Reasons To Use An MSSP

Many organisations are increasingly becoming overwhelmed by the challenge that cybersecurity represents, the primary reason many organisations are now turning to a managed security service provider (MSSP) to help them cope, it can simply be too much to deal with for most.

Why You Should Consider Automating Your Cybersecurity

According to Bill Gates "the first rule of any technology used in a business, is that automation applied to an efficient operation will magnify the efficiency", and while he may not have been thinking about cybersecurity operations at the time, his thinking absolutely applies to the modern cybersecurity operations centre (CSOC).

A Short History Of The Internet

I am not by any measure old unless you ask my nieces, but I remember when we had no internet and my niece's minds boggle at that, they think I must be ancient. How could you survive without the internet they asked me, in their minds the concept of no internet is pretty much science fiction and the thought of not having internet access scares them.

Why You Need To Consider Cybersecurity Honeypots

Cybersecurity analysts have noted that small to medium-sized business attack traffic has been increasing throughout 2019, unusually reaching higher levels than Telnet & SSH attack traffic. It isn't clear who is causing this as no files are uploaded, just connections from multiple countries being the root cause.

Why You Need To Take Asset Inventory Seriously

An old saying which always struck me as strange and misguided is "What you don't know can't hurt you". Of course what you don't know can hurt you, especially if it's an unseen oncoming vehicle, for example, or if you work in the cybersecurity space.