Addressing cyber security in renewables key for energy security
While renewable energy is a key component to achieving the world's net zero goals, the reality is that there is still work to do to ensure it can be relied upon as a secure energy source. With solar energy backed as one of the world's primary energy sources of the...

Embracing SSE can strengthen the business network
The network infrastructure ecosystem has grown in complexity since the normalisation of hybrid work. A distributed workforce has put pressure on security and technology teams to rethink how to safeguard company data and systems from compromise. By Warren Gordon,...
Prevent cyberattacks by ensuring staff are aware
Over the past few years, cybersecurity has gone from being a niche concern to something people think about on a day-to-day basis. By Suraj Tiwari, global head of information security at VFS Global Data misuse and breaches at major international organisations have cut...

Empowering the frontline is key to cybersecurity success
Cybersecurity threats are constantly evolving and becoming more sophisticated, requiring organisations to recognise that their employees are both their greatest asset and their greatest vulnerability. By Kumar Vaibhav, lead senior solution architect: cybersecurity at...
Phish, smish and pay: The high cost of security failure
Organisations want solutions that mitigate the growing security threat and elevate their security posture. They need a layered and intelligent approach to security capable of withstanding the threats. And there are a significant number of threats. In 2023, more than...
Phishing used to exploit digital wallets
As payment methods become more sophisticated, so are the cybercriminals who are exploiting consumers who are insufficiently informed about how digital wallets work. Fraudulent activity doesn't take advantage of any security deficiencies in the cards or wallets...
Is your CEO safe from whaling or spear phishing?
Most cyberattacks are opportunistic. Much like a mugging on a dark street, it doesn't matter who the victim is as long as the perpetrators gain something out of their crimes. However, a growing number of these attacks are designed to target specific people like CEOs,...

Data for ransom: Yours …
The highest number of data compromises tracked by the Identity Theft Resource Center (ITRC) was 1 860, impacting around 300-million people in 2021. Until 2023. The ITRC tracked 3,205 data compromises affecting 353,027,892 individuals at a 72% increase on 2021's...
Kaspersky releases free malware scanner for Linux
Cybercriminals aren't ignoring Linux-based devices, which becomes evident when looking at some of the recent examples of malware targeting this operating system: a Linux implant for the DinodasRAT malware -- also known as XDealer; or a backdoor in the Trojanised...
Public-facing applications harbour security risks
Today, public-facing applications play a pivotal role in enabling businesses to interact with customers, partners, and stakeholders. These applications, ranging from websites to APIs and web services, serve as the digital storefronts of organisations, providing...

A call for robust DDoS defence strategies
Within the constantly-fluid cybersecurity arena, Distributed Denial of Service (DDoS) attacks present a formidable challenge. The staggering frequency and impacts of these attacks are often underestimated, yet they are a relentless threat, disrupting the very fabric...
Tips to improve your backups
Backups are crucial. Whether you are worried about a ransomware attack or some other disaster taking out the information that keeps your business running, backups are the best way to mitigate data loss risks. Yet, organisations are often unsatisfied with the value...