default
+

Thank you for contacting us.


One of our expert consultants will review your inquiry.

+

Thank You


We hope you find this resource helpful.
If you have any questions, don't hesitate to contact us.

+

Thank you for contacting us.


One of our expert consultants will contact you within 48 hours.

+

Almost There!

Please fill out the form to complete your
whitepaper download

+

Almost There!

Please fill out the form to complete your
brochure download

Latest News

Norsk Hydro Breach

Norsk Hydro Breach: Cyber Threats to Industry

Cyber-attacks against industrial systems have become an increasing concern in recent years and the Norsk Hydro Breach disclosed on Tuesday, March...

READ MORE
What is a security policy?

Why do we need a Security Policy?

An information security policy is a document created to guide behaviour with regards to the security of an organization’s data, assets,...

READ MORE
Cross-site Scripting (XSS)

How does Cross-site Scripting (XSS) impact customers?

Cross-Site Scripting (XSS) continues to be within the OWASP Top 10 (an awareness document that is compiled with vulnerability statistics from...

READ MORE
Citrix Breach 2019

Citrix Breach: Terabytes of data compromised

On Friday, March 8, 2019 the software company Citrix issued a brief statement admitting that hackers had recently managed to breach...

READ MORE
Purpose of a Penetration Test

What is the purpose of a Penetration Test?

The purpose of a penetration test is to explore your business from the perspective of an attacker and, most importantly; to...

READ MORE
CSRF Impacts Customers

Are you protecting your customers from CSRF?

Cross-site request forgery (CSRF/XSRF) has become a term that is often confused with cross-site scripting (XSS). These two vulnerabilities are in...

READ MORE