Have you checked your cybersecurity processes lately?

Have you checked your cybersecurity processes lately?

You may take it for granted that your organisation has cybersecurity systems and processes in place, but have you checked them recently to make sure everything is up to date? Because even the most diligent businesses and organisations – including government...
4 cybersecurity predictions for 2024

4 cybersecurity predictions for 2024

2023 was the year of generative AI and its impacts were felt across the cybersecurity landscape. Not only because of the threat it poses when in the hands of malicious actors, but also because of the way it can be used to tackle them. And realistically, generative AI...
Cybercrime in the healthcare sector

Cybercrime in the healthcare sector

No industry is safe from a potential cyberattack, but some are more attractive to criminals than others. The healthcare sector is one of the most targeted industries by cybercriminals, and has the highest data breach cost of any industry, averaging USD 10.93m. Why is...
5 of the biggest data breaches of 2023

5 of the biggest data breaches of 2023

Last year was a big year of data breaches. By October 2023, there had already been 2,116 compromises in the US alone, compared to 1,802 in the entire 2022. And whilst the number of people affected in these attacks was just over half that of the previous year, it still...
Will you be reducing your cybersecurity headcount in 2024?

Will you be reducing your cybersecurity headcount in 2024?

Despite increasing security incidents and growing threats of cyber attacks, almost half of organisations that took part in a recent study plan to reduce their security headcount. And, according to PwC, an estimated 20% of organisations will shrink or freeze their...
Top cybersecurity trends from 2023

Top cybersecurity trends from 2023

Cybersecurity threats are constantly evolving as malicious actors change tactics and take advantage of emerging technologies to attack new targets, scale up their operations and evade capture. As a result, security professionals need to be aware of these changes. Here...