Thoughts Insights & Opinions
Hulle weet nie wat ons weet nie!
Pfortner, as a leading provider of cybersecurity solutions, places customer security at the forefront of our mission. To underscore our dedication to protecting sensitive data and communications, we have made a strategic choice not to release vulnerabilities on the Common Vulnerabilities and Exposures (CVE) database.
Cybersecurity in 2024: Navigating the Evolving Landscape of Secure Communications
As we step into 2024, the cybersecurity landscape is undergoing transformative shifts, particularly in the realm of secure communications. Here’s a concise look at the six pivotal trends shaping our digital defences this year
It’s the shopping month of December, and your ATMs are down …
As the holiday season approaches, the spectre of ATM downtime looms over December. With exponentially growing cyber threats, increased transaction volumes, last-minute shopping sprees, and year-end financial activities, ATM networks take huge strain, leading to unexpected outages and downtime of mission-critical services.
BOKKE Defense delivers another Trophy!
South Africa’s perfect record in Rugby World Cup finals was extended in Paris on Saturday as they became the first nation to win the tournament four times. A nerve-shredding 12-11 victory over New Zealand completed back-to-back World Cup wins and led to debate about whether they are the greatest team in history.
The only secure system is…
Gene Spafford is credited with the now famous quote, “The only truly secure system is one that is powered off, cast in a block of concrete, and sealed in a lead-lined room with armed guards – and even then, I have my doubts.”
Theft of Microsoft’s email signing key: Hackers are on a “signing spree”
In a recent blog post , Microsoft revealed how hackers stole an email signing key that the company uses to secure consumer email accounts like Outlook.com. The hackers used this …
When AI is harnessed for BAD – WormGPT
A new generative AI cybercrime tool called WormGPT has been advertised on underground forums as a way for adversaries to launch sophisticated phishing and business email compromise (BEC) attacks.
When Security is an Afterthought
In today’s interconnected world, where cyber threats are ever-evolving, ensuring robust security measures in software development is paramount.
A Comparison Between Offensive and Defensive Cybersecurity Strategies.
A Comparison Between Offensive and Defensive Cybersecurity Strategies Cybersecurity is an ever-evolving field that demands constant adaptation and strategic decision-making. Two key approaches to addressing cyber threats are offensive and defensive cybersecurity...