BLOG: The Rise Of Stalkerware
Stalkerware is a term used to refer to software applications that are specifically designed to track individuals while hiding from […]
Stalkerware is a term used to refer to software applications that are specifically designed to track individuals while hiding from […]
Cryptojacking was at the centre of a lot of controversy in 2017 and 2018 but slowly died down in 2019
A vulnerability is a weakness or error in a system/device’s code that can compromise the confidentiality of sensitive data through
A great way for organisations to deal with the expanding cyber threat landscape is to have a third-party risk management
The current cyber threat landscape means that taking a pre-emptive and proactive approach to vulnerability management is imperative. Every new
Machine learning and artificial intelligence provide us with a wide range of cybersecurity benefits. Artificial intelligence and machine learning can
The European Union Agency for Cybersecurity (ENISA) conducted research and based on these findings, supply chain attacks are projected to quadruple by
Third-party security breaches are increasing and rising at a large rate, equally in volume, complexity and difficulty. Third-party risk breaches
Research conducted by Respect in Security found that a third of cyber security professionals say they have had personal experience
A Cybersecurity Advisory report was co-authored and published on 28th July by the U.S. Cybersecurity and Infrastructure Security Agency (CISA),