Every Second Counts When You’re Under Attack — Imperva Provides 3 Second DDoS Mitigation,...
Let’s be blunt: cybersecurity is a never-ending arms race between bad actors and IT and security teams. Lately, attackers have surged. Armed with powerful,...
Plurox: Modular backdoor
In February this year, a curious backdoor passed across our virtual desk. The analysis showed the malware to have a few quite unpleasant features....
[Buyer’s Guide] Log Management Tips
Tripwire, Inc.
[Buyer’s Guide] Security Configuration Management Tips
Tripwire, Inc.
SQL Injection Attacks: So Old, but Still So Relevant. Here’s Why (Charts)
We’re living in the Golden Age of data. Some companies analyze it to better themselves, others trade it for profit, none give it up...
The Struggle is Real
We’ve all heard the phrase, “We live in a male dominated world.” This phrase is most often delivered with a negative connotation when someone...
What kids get up to online
Today’s children navigate the Internet better than adults. They are not afraid to try out new technology, and are quick to grasp new trends...
2019 Verizon DBIR Response Checklist
2019 Verizon DBIR Response Checklist #outlook a{ padding:0; } body{ width:100% !important;...
Platinum is back
In June 2018, we came across an unusual set of samples spreading throughout South and Southeast Asian countries targeting diplomatic, government and military entities....


![[Buyer’s Guide] Log Management Tips](https://www.dataproof.co.za/wp-content/uploads/2019/06/buyers-guide-log-management-tips.jpg)
![[Buyer’s Guide] Security Configuration Management Tips](https://www.dataproof.co.za/wp-content/uploads/2019/06/buyers-guide-security-configuration-management-tips.jpg)









