Estimated reading time: 2 minutes
Defending the organizational perimeter from data breaches forms the crux of an existing security strategy. Neutralizing potential damages emanating out of cybersecurity threats is possible only if the data sets are secured across both sides of the perimeter. When...Information Technology, Network Security & Cybersecurity Updates
Estimated reading time: 1 minute
The recent zero-day vulnerability in Microsoft Office vulnerability CVE-2017-11826 enables attackers to perform a Remote Code Execution on targeted machines. According to a recently published blog post, this vulnerability is being exploited in the wild. Microsoft has released a security update on October 10, 2017,...Estimated reading time: 5 minutes
The Central Bank of Kenya (CBK) recently issued a guideline to all commercials banks across Kenya to fortify their cybersecurity and establish effective cybersecurity governance and risk management. The CBK acknowledged the growing risk of cyber threats and highlighted...Estimated reading time: 3 minutes
Data breaches and cyber-attacks are common occurrences which usually proliferate at an exponential rate. While it is important that enterprises tighten their enclosures, it is also advisable to understand how cybercriminals prepare for a breach. Hacker surveillance is one way...