What Is the Secure Software Development Life Cycle (SSDLC)?

Most organizations have a well-oiled machine with the sole purpose of creating, release, and maintain functional software. However, the increasing concerns and business risks associated with insecure software have brought increased attention lately with known Tech Giants the need of security integration into the development process. Implementing a proper Secure…

Continue Reading

Common security threats – Phishing

What is phishing: Any attempt to compromise a system and steal information by tricking a user into responding to a malicious message. The most common phishing attacks involve emails armed with malware hidden in attachments or links to infected websites. However, phishing can be conducted via other methods such as…

Continue Reading

Cyber Security: WiFi Security

Nowadays, many organisations want their employees to be mobile and be able to connect from everywhere. It is an excellent approach, however…. most of the network intrusions and phishing occur through mobile and wi-fi devices. Credentials can easily be phished by cyber-criminals and used to access your confidential data. Here…

Continue Reading