Featured news
The Industrial Control System Visibility Imperative
The Industrial Control System Visibility Imperative #outlook a{ padding:0; } body{ width:100%...
Tech News
Security
APIs Ease Customer Interaction — and External Attacks. Here’s how to...
To deliver seamless service experiences to our customers, businesses now rely heavily on application programming interfaces (APIs). These are a non-negotiable aspect of the...
Most popular
November 2025 CVE Landscape: 10 Critical Vulnerabilities Show 69% Drop from October
November 2025 saw a significant 69% decrease in high-impact vulnerabilities, with Recorded Future's Insikt Group® identifying 10 vulnerabilities requiring immediate attention, down from...
The 6 URL Shorteners You Didn’t Know Were Helping Hackers
By: Madalynn Carr, Intelligence TeamThreat actors are constantly evolving and adapting by discovering new, unique ways to bypass email-based security controls. One key method...
DDoS attacks in Q1 2019
News overview
The start of the year saw the appearance of various new tools in the arsenal of DDoS-attack masterminds. In early February, for instance,...





![[eBook] Building A Cyber-Secure Culture](https://www.dataproof.co.za/wp-content/uploads/2018/12/ebook-building-a-cyber-secure-culture.png)








