This post was last updated on August 21st, 2020 at 10:07 am

Security Briefs

Insightful guides, overviews, and best practice manuals relating to the current state of cybersecurity in the various industry verticals we serve.

SIEM Alert Validation and the Dangers of Alert Fatigue

Despite rich data provided by SIEMs, organizations find themselves drowning in false positives, false negatives, and irrelevant security alerts—making efficient security operations difficult for many SOCs.

The Growing Threat of Malware in Higher Education

As malware, cybercrime, and attacks evolve they present a greater threat to private and public educational institutions, which are often underprepared to deal with sophisticated and persistent cyber threats.

Africa, Technology Growth and the Threat of Malware

The expansion of IT, connectivity, and business in Africa has led to the continent becoming a target for cyber attacks. This brief looks at the security challenges facing the region, as well as solutions the problem.

The Top Concerns of Security Operations Centers (SOCs)

While 75% of SOCs believe proactive detection is of major importance (42% consider it a top priority) other issues stand out... This security brief examines the top concerns of Security Operations Center (SOC) managers.

Uncovering a Major Hidden Risk of GDPR Legislation

Many companies are focused on GDPR compliance, but within GDPR legislation are hidden risks that threaten companies who believe themselves compliant, but may unwittingly be missing the bar...

Protecting Financial Infrastructure From Cyber Threats

The increasing volume of malware and advanced cyber attacks targeting our financial infrastructure has led regulatory bodies to include cyber security and risk management practices and standards.

Protecting Retail Customers From POS Cyber Attacks

Point of Sale (POS) systems are a prime target for cyber attacks because they provide an access point through which cybercriminals can access and steal payment info, making them attractive targets for hackers.