01 May Managing the security aspect of open-source software
Open source software comes with an array of benefits, but needs constant security patching and hardening to ensure it is resilient to attacks....
Open source software comes with an array of benefits, but needs constant security patching and hardening to ensure it is resilient to attacks....
It could be time for you to evaluate your IT systems and set up an external penetration test for your business. Find out why this is necessary right here....
Hints and tips on how to safeguard your most valuable digital asset - your data. From sensitive customer records, to employee data, financial data and transactional data; data is the lifeblood of any organisation, and therefore it should be well protected at all times....
Cyber security needs to be at the core of any digital transformation project. Built-in to increase business resilience, not only for launch but on an ongoing basis. Safeguard investment and the interest of stakeholders and ensure all is in line with the respective regulatory frameworks....
Cyber security and cyber risk management trends keep evolving throughout the year. New threats, new attack patterns and management of cyber risks that emerged during 2021 are mostly driven by accelerated digital transformations. ...
Organisations should be proactive in their cybersecurity strategy and approach. When this is not possible, it is of utmost importance that robust detection tools are in place and strong responses are activated to remediate and defend against possible attacks....
One can never tell when a cyber attack will hit, so it is always wise to be prepared and have your house in order. Always be cyber-resilient and be protected against the various possible cyberattacks....
A string of cyber attacks and scams hit Malta over the past months. Hundreds defrauded and tens of thousands of euros stolen by cyber criminals targeting the Maltese public and businesses based in Malta....
Penetration testing is not a one-time effort but an integral part of any organisation’s Cyber security strategy. Both internal systems and the external environment constantly change and evolve thus penetration testing needs to be carried out periodically to identify any holes and vulnerabilities cyber criminals can possibly exploit....
Cyber security threats related to WordPress, Google Workspace and Dropbox. A look at the most common security threats and what can be done to safeguard your WordPress website, Google Workspace (formerly G-Suite) and Dropbox....