10 Apr Up-to-date assessments of cyber security posture.
3 ways to come up with an up-to-date assessment of your organisation's cyber security posture, which is crucial to strengthen the cyber security defences....
3 ways to come up with an up-to-date assessment of your organisation's cyber security posture, which is crucial to strengthen the cyber security defences....
The igaming industry is one of the top targets of cyber criminals. Both operators and users get targeted by cyber criminals. Email phishing, malware and DDoS attacks are the top three threats that if not well defended-against can negatively impact an igaming brand....
Elements to include in a cyber security strategy. From regular pen tests, to phishing simulations and cyber awareness training. The importance of a CISO and vulnerability assessments to understand your risk exposure....
A list of the most common WordPress vulnerabilities together with a number of actions to safeguard against these weaknesses. From WordPress core updating to third party plugins updating and utilising secure web hosting environments - the salient dos to harden your Wordpress website. ...
Penetration testing can take various shapes and forms. The main methods are listed and explained, together with their best use case. ...
A look at high profile hacks in the crypto world including attacks on crypto exchanges and web platforms used to mine crypto currencies....
An overview of the main phases making up an effective penetration test. From the initial reconnaissance phase, to scanning, vulnerability assessment, exploitation and the final reporting phase - All the steps in a pen test explained....
The importance of pen tests. The benefits of carrying out regular professional pen tests. What is included in the top pen test types. The starting point of any pen test exercise. All these, in an interview with Cybergate’s CTO....
What one should keep in mind when designing a web or mobile application. Considerations to be taken into account when designing the functionality and subsequently the user experience of a digital platform....
A thorough definition of Identity and Access management together with an overview of the main components making up an IAM and the benefits the organisation enjoys when using an IAM....