Critical F5 BIG-IP bug​

Multiple vulnerabilities have been found in the F5’s BIG-IP network software  (BIG-IP iControl REST) authentication. Disclosed last week, the bug affects multiple versions of the network management software, which is being tracked as CVE-2022-1388.​ ​Patch ASAP! ​ ​Although CVE-2022-1388 is a proof-of-concept (PoC), there is still a high chance that this vulnerability could expose thousands of users to a remote […]

Innovate Your Hybrid Workplace: Securing Your Multi-Cloud

https://www.youtube.com/watch?v=z9g5J2uNU8MThe adoption of the hybrid workplace has enabled businesses to meet new requirements and improve internal processes, but it has also brought with it new levels of cyber risk. 2022 is the year where organisations will need to go beyond surviving to thriving – by innovating and strengthening their approach to risk management. In this series […]

In partnership with Condatis: Outlook for Identity and Access Management

ITC’s 8th annual Cyber Summit 2022 centres around the theme BEYOND – From resilience to risk. 2021 was the year where resilience was a must for organisations to survive, and whilst this will continue, 2022 is the year where organisations will need to go beyond surviving to thriving – by innovating and strengthening their approach to […]

Panel: Resilience to Risk

ITC’s 8th annual Cyber Summit 2022 centres around the theme BEYOND – From resilience to risk. 2021 was the year where resilience was a must for organisations to survive, and whilst this will continue, 2022 is the year where organisations will need to go beyond surviving to thriving – by innovating and strengthening their approach to […]

The Importance of Fostering A Culture of Cyber Security

With many organisations around the world shifting gear to a hybrid working model and accelerating cloud adoption at speed, we continue to witness a surge of sophisticated cyber attacks backed by increased adversary motivation and capability. Therefore, it is not a surprise that cyber security has been identified as the top priority for businesses post-pandemic, […]

The Human Element of Cyber Risk

If I were to ask 10 people what they thought cyber security actually entails, I am almost certain that most would think of the highly technical coding you see in movies. Although they would not be entirely wrong, there is so much more to cyber security than just technology. Yes, there are many solutions available […]

Not all assets and data are created equal – the critical first step in risk management

Today’s accelerated digital world is exposed to expanding threat vectors however, protecting everything equally is not an option. A crucial question that must be answered at the start of planning any effective cyber security strategy is: ‘What exactly do we value and need to keep secure?’ Rising threat landscape vs organisational preparedness Data breaches big […]