Innovate Your Hybrid Workplace: Securing Your Multi-Cloud

https://www.youtube.com/watch?v=z9g5J2uNU8MThe adoption of the hybrid workplace has enabled businesses to meet new requirements and improve internal processes, but it has also brought with it new levels of cyber risk. 2022 is the year where organisations will need to go beyond surviving to thriving – by innovating and strengthening their approach to risk management. In this series […]

Russia-Ukraine Malicious Cyber Activity

The Ukrainian government confirmed yesterday afternoon that another large-scale cyber attack is taking place; this is less than a week since websites were last targeted in a similar attack. “We’ve not seen something [like this] that’s taken it to a completely different level,” an official told the BBC. This large-scale cyber attack preceded Russia’s invasion […]

Innovate Your Hybrid Workplace: Unified Identity Governance

The adoption of the hybrid workplace has enabled businesses to meet new requirements and improve internal processes, but it has also brought with it new levels of cyber risk. 2022 is the year where organisations will need to go beyond surviving to thriving – by innovating and strengthening their approach to risk management. In this […]

Major SAP Vulnerability​

Priority:​ High – CVSS 10​ ​Executive Summary:​ ​German enterprise software maker SAP and the US Cybersecurity and Infrastructure Security Agency issued security advisories on Tuesday 8th February to warn SAP customers to install the company’s February security patches as soon as possible in order to prevent the exploitation of a major vulnerability in a ubiquitous SAP component.​ ​Tracked as CVE-2022-22536, the vulnerability […]

Cyber risk: Why investors should care about cyber security

“A company’s cyber preparedness is a crucial consideration in any investor’s investment decision. It is a business risk that you cannot afford to ignore.” ITC Secure Chief Executive, Arno Robbertse, explains why and shares key indicators for cyber due diligence to consider. Originally published in Sensus Magazine. Link to the magazine: here As we have all witnessed, the pandemic pushed organisations over […]

In partnership with Microsoft: The Future of Work

ITC’s 8th annual Cyber Summit 2022 centres around the theme BEYOND – From resilience to risk. 2021 was the year where resilience was a must for organisations to survive, and whilst this will continue, 2022 is the year where organisations will need to go beyond surviving to thriving – by innovating and strengthening their approach […]

In partnership with Condatis: Outlook for Identity and Access Management

ITC’s 8th annual Cyber Summit 2022 centres around the theme BEYOND – From resilience to risk. 2021 was the year where resilience was a must for organisations to survive, and whilst this will continue, 2022 is the year where organisations will need to go beyond surviving to thriving – by innovating and strengthening their approach to […]

Panel: Resilience to Risk

ITC’s 8th annual Cyber Summit 2022 centres around the theme BEYOND – From resilience to risk. 2021 was the year where resilience was a must for organisations to survive, and whilst this will continue, 2022 is the year where organisations will need to go beyond surviving to thriving – by innovating and strengthening their approach to […]

Commonly Exploited Vulnerabilities

Priority: High   Executive Summary: In a series of coordinated cyber attacks beginning on the 14th January 2022, orchestrated by Russian state-sponsored actors, more than 70 Ukrainian government websites have been defaced or rendered inaccessible. Russian threat actors have used spear-phishing, brute-force and exploited known vulnerabilities to gain access to target networks by compromising third-party […]

CVE-2021 20038..42: SonicWall SMA 100 Multiple Vulnerabilities (FIXED)

Priority: High Executive Summary: SonicWall has verified and patched vulnerabilities of critical and medium severity (CVSS 5.3-9.8) in SMA 100 series appliances, which include SMA 200, 210, 400, 410 and 500v products. SMA 100 series appliances with WAF enabled are also impacted by the majority of these vulnerabilities. A critical severity vulnerability (CVSS 9.8) in […]